Annex Z-8: Digital Surveillance and Covert Intrusion (2019–2025)/Z-8:数字监控与隐蔽侵入(2019–2025)

Annex Z-8: Digital Surveillance and Covert Intrusion (2019–2025)/Z-8:数字监控与隐蔽侵入(2019–2025)

 

Systemic Evidence of Government-Linked Digital Harassment

This annex presents a collection of documented digital surveillance, email intrusion, password breaches, and covert access events experienced by Beizi Li between 2019 and 2025. The incidents point to a coordinated campaign of intimidation and disruption targeting her communication, anonymity, and evidence preservation.


1. Compromised Passwords and Suspicious Internal IP Logs

In May 2025, Beizi’s Chrome password manager alerted her that 104 of her stored passwords had been compromised. Notably, many of these breaches were linked to an IP address range in the internal private network space (10.205.1.30), which is not associated with any public website.

  • Email affected: libeizi@mail.dk, lebeizi66@gmail.com, kristinali218@gmail.com
  • Breach timestamps: spanning over 8 months
  • Possible conclusion: Her login credentials were harvested inside a closed institutional network, possibly in a hospital or state facility where her computer access was under surveillance.

Evidence: Screenshot saved as Z7_104CompromisedPasswords_2025-05-05.png


2. Unauthorized App Access: Otter.ai

Google account security logs revealed that on April 14, 2025, a third-party application named Otter was granted full access to Beizi’s Google account.

  • Beizi did not initiate this authorization.
  • Otter is a speech-to-text transcription tool, which, if misused, can intercept voice memos, audio notes, or private recordings.

This incident aligns with known tactics where adversaries use seemingly benign tools to extract private data.

Evidence: Screenshot saved as Z7_GoogleAppAccess_Otter_2025-04-14.png


3. Suspicious Email Plugin: EmailDrop Detected and Removed

In early May 2025, Google Chrome flagged a potentially harmful extension titled EmailDrop. Though Beizi never consciously installed this plugin, it was found active in her browser.

  • Risk: The plugin had access to read all email addresses on visited pages, and possibly intercept login attempts.
  • Status: Plugin removed, system cache cleared. Device speed improved immediately after removal.

Conclusion: EmailDrop may have acted as a covert data siphon implanted without user consent.

Evidence: Screenshot saved as Z7_EmailDrop_Removal_2025-05-05.png


4. Forced Removal from Privacy Network Mailing List

On May 5, 2025, at 04:51 AM, Beizi received an unexpected confirmation email stating that she had been unsubscribed from The Tor Project’s newsletter.

  • Beizi did not initiate this unsubscription.
  • The Tor Project is a globally recognized platform for anonymous and secure communication.
  • The removal indicates either email interception or unauthorized interaction with Beizi’s secure communications.

Evidence: Screenshot saved as Z7_Tor_Unsubscribed_2025-05-05.png


5. Contextual Risk: Pattern of Coordinated Harassment

These digital incidents are not isolated. They complement physical surveillance, forced hospitalization, and repeated psychiatric interventions orchestrated against Beizi between 2022 and 2024. The combined evidence points to a state-linked campaign to isolate, intimidate, and digitally erase her voice.

This annex is part of a wider archive detailing coordinated abuse by multiple government bodies in Denmark. Each entry has been archived both locally and across multiple global cloud platforms.


Status: Public copy stored at https://libeizi.com/z8
Last update: May 4, 2025

滚动至顶部