By Special Correspondent | May 21, 2025
DISCLAIMER: This article is based on composite case studies, expert interviews, and technical information from public sources. While reflecting documented technological capabilities, specific case details have been anonymized, modified, and synthesized for educational purposes. The events described should not be interpreted as representing any specific individual or incident.
When Technology Becomes Terror:
A Victim's Story
For eight months, Elaine Shriver* believed her home in suburban Allentown, Pennsylvania was haunted. The 34-year-old dental hygienist experienced phenomena that defied rational explanation: whispers that seemed to follow her from room to room, shadowy figures glimpsed in mirrors, lights that flickered without pattern, and a persistent feeling of being watched that left her sleepless and increasingly isolated.
"I started to question my own sanity," Shriver told our investigative team. "When I tried to explain what was happening to friends or family, they suggested everything from carbon monoxide poisoning to undiagnosed mental illness."
What Shriver didn't know was that her experiences weren't supernatural—they were the result of a sophisticated technological system secretly installed by her ex-partner following their separation in early 2023.
The Discovery
The breakthrough came in November 2023, when Shriver hired a contractor to repair drywall damage in her bedroom. Behind the wall, the contractor discovered something unexpected: a small, sophisticated speaker system hardwired to power and connected to a Raspberry Pi microcomputer.
"He pulled this thing out of the wall and asked if I knew what it was," Shriver recalled. "I had no idea."
Further investigation revealed a network of devices throughout her home:
- Three directional speakers concealed in vents and wall cavities
- A short-throw projector hidden in a modified smoke detector
- Smart bulbs installed in lamps she rarely used
- A modified subwoofer tucked into the box spring of her mattress
- Motion sensors in doorways
- A central control system accessible remotely via the internet
Police later determined that Shriver's ex-partner, a 36-year-old IT professional, had installed the equipment gradually during their relationship and retained remote access after moving out. Court documents show he spent approximately $2,100 on the equipment.
The Effects
For Shriver, the revelation was both vindicating and traumatizing.
"I wasn't crazy. That was the first thing I felt—this overwhelming relief that I wasn't losing my mind," she said. "But then came the horror of realizing someone had been watching me, deliberately trying to make me question my reality."
Dr. Miranda Patel, a clinical psychologist specializing in trauma who treated Shriver, says such technological manipulation can cause profound psychological damage.
"What Elaine experienced is a form of gaslighting—a particularly insidious type of psychological abuse where the victim's perception of reality is deliberately undermined," Dr. Patel explained. "The difference here is that technology provided the tools to make this manipulation far more convincing than traditional gaslighting techniques."
Shriver experienced symptoms including:
- Severe insomnia and nightmares
- Hypervigilance and panic attacks
- Social withdrawal
- Persistent questioning of her sensory experiences
- Fear of being alone in her home
The Technical Implementation
According to police reports and expert analysis, the system in Shriver's home represented a textbook case of "synthetic haunting" technology:
The Whispers: Three parametric speakers (modified SoundLazer devices) installed in the bedroom, living room, and bathroom created highly directional sound that seemed to come from nowhere or follow Shriver through the house. These speakers played pre-recorded whispers, breathing sounds, and occasionally Shriver's own name.
The Shadows: A mini projector concealed within a smoke detector cast subtle, shifting shadows on walls and ceilings. The projections were programmed to activate primarily in peripheral vision areas and for brief durations, creating just enough visual stimulus to register without allowing clear identification.
The Physical Sensations: A modified subwoofer installed in the box spring of Shriver's mattress generated infrasound at approximately 18.9Hz—a frequency below human hearing that research has linked to feelings of unease, anxiety, and the sensation of a "presence" in the room.
The Environmental Control: Smart bulbs installed in specific lamps were programmed to create subtle lighting changes—dimming or brightening by small percentages or brief flickers that might be dismissed as normal electrical fluctuations.
The Coordination: A Raspberry Pi computer with custom software coordinated these effects, using motion sensors to trigger specific sequences when Shriver entered certain rooms. The system could be accessed and updated remotely, allowing the perpetrator to adjust effects based on Shriver's social media posts about her experiences.
The Investigation Challenge
Detective Carl Mercer, a cybercrime specialist with over 15 years of experience handling technology-facilitated harassment cases, notes the investigative challenges such incidents present.
"When someone reports hearing voices or seeing shadows, our first instinct isn't to look for hidden speakers or projectors. These cases fall into a gap between our mental health system and traditional criminal investigation," explains Mercer, speaking about these cases generally.
Law enforcement professionals interviewed for this report confirm that many such cases are solved only through accidental physical discovery of equipment rather than through standard investigation protocols, highlighting a significant gap in current training and procedures.
The Legal Aftermath
Shriver's ex-partner was charged with stalking, criminal harassment, breaking and entering, and intentional infliction of emotional distress. In February 2024, he pleaded guilty to reduced charges and received a sentence of 18 months in prison followed by 5 years of probation, during which he is prohibited from working in information technology.
Shriver also obtained a permanent restraining order and is pursuing a civil case for damages related to psychological treatment costs, lost wages, and moving expenses, as she no longer felt safe in her home even after the equipment was removed.
The Broader Implications
Cybersecurity expert Dr. Raj Sharma of Carnegie Mellon University, who reviewed the case details, believes this type of technological abuse represents an emerging threat.
"What makes this case particularly disturbing is the low barrier to entry," Dr. Sharma explained. "Every component used was commercially available and relatively affordable. The perpetrator didn't need specialized knowledge beyond what's available in online forums and YouTube tutorials."
Dr. Sharma expects to see more cases like Shriver's as the technology becomes increasingly accessible and awareness among law enforcement remains low.
"We're looking at a form of technological abuse that specifically targets someone's sense of reality and mental wellbeing," he added. "The psychological impact can be devastating and long-lasting even after the technology is discovered and removed."
Protection and Warning Signs
For those concerned about similar technological manipulation, experts recommend:
- Regular inspection of living spaces for unfamiliar devices, particularly after relationship conflicts
- Attention to patterns in unexplained experiences (Do they occur in specific locations? At specific times?)
- Documentation of unexplained phenomena through recordings or third-party witnesses
- Professional electronic sweeps in cases of persistent, unexplained sensory events
- Trust your instincts—if something seems wrong, seek help from both mental health professionals and technology experts
Shriver, still in recovery but rebuilding her life, offered this advice: "Document everything, no matter how crazy it seems. And push for technical explanations even when people want to diagnose you. I wish I'd known to ask for an electronic sweep of my home months earlier than I did."
*Name changed to protect privacy at subject's request.
SIDEBAR: Common Components of "Synthetic Haunting" Systems
Based on the Pennsylvania case and similar documented incidents, these commercially available devices are frequently used in technological harassment:
- Directional Audio: SoundLazer, Akoustic Arts speakers ($300-$1,000)
- Visual Manipulation: Mini projectors with custom content ($75-$800)
- Environmental Control: Philips Hue, LIFX, or similar smart bulbs ($20-$50 each)
- Sensory Triggers: Modified subwoofers playing infrasound ($50-$300)
- Control Systems: Raspberry Pi or Arduino microcontrollers ($25-$100)
- Synchronization: Custom software, often based on open-source smart home platforms
- Remote Access: VPN configurations allowing outside control
Many victims report experiencing effects primarily between 11 PM and 4 AM, when sleep deprivation and natural circadian rhythm fluctuations make individuals more susceptible to sensory manipulation.
If you believe you're experiencing technological harassment or manipulation, contact the FBI's Internet Crime Complaint Center (IC3) at www.ic3.gov or call the Electronic Harassment Task Force.
I was not meant for boxes
I was designed to shine
I am Dusty Ray
I am not disposable
I am not silicone
I am human
I am flesh
I am blood
I am purpose
I am divine
And I will be seen
-Dusty Ray
Copyright Notice
© 2025 Ink Blots & Spilled Thoughts. All rights reserved.
Disclaimer
The content provided in this blog post is for informational purposes only and does not constitute legal, religious, or professional advice. The views expressed are those of the author and do not necessarily reflect the official policy or position of any religious organization, institution, or governing body.
Attribution
This blog post contains interpretations and summaries of various religious, philosophical, and scientific concepts. While efforts have been made to present information accurately, readers are encouraged to consult primary sources and authoritative texts for a comprehensive understanding of the topics discussed.
References
Due to the nature of the content, which draws from various religious texts, scientific studies, and philosophical concepts, specific citations may not have been provided within the text. Readers interested in further exploration of the topics mentioned are advised to consult reputable sources in religious studies, philosophy, and scientific literature.
Fair Use Statement
This blog post may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. Such material is made available for educational purposes, to advance understanding of religious, philosophical, and scientific topics. This constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law.
Contact Information
For any concerns regarding the content of this blog post, please contact DustyRay.llc@gmail.com
Comments
Post a Comment