When “Security” Becomes Sabotage: My Accounts Keep Getting Hit Every Time I Publish Williamson County Evidence — and the Pattern Is Now Impossible to Ignore


Every time I publish evidence about Williamson County’s medical misconduct, staffing fraud, or jail abuse, something predictable happens — and not because of “weak passwords” or “user error.”

I use extremely long, non-dictionary, no-word passphrases.
I use 2-factor authentication.
I use hardened security across every account.

And yet the same sequence keeps firing like a script:

  1. I publish documents naming Williamson County personnel.
  2. Within hours, names disappear from the blog.
  3. My Google Docs lose entire paragraphs.
  4. Files vanish from Google Drive.
  5. Emails are marked read or deleted without my action.
  6. Sheets in my blog’s backend are quietly edited.
  7. Data disappears from posts that specifically expose county misconduct.

This is not random.
This is not accidental.
This is not a “technical glitch.”

This is targeted interference.


They Aren’t Just Watching — They’re Editing, Altering, and Erasing

Let’s break down the full scope of what’s happening, because the pattern has escalated into something you only see in corruption cases or federal investigations:

1. Deleting or altering emails

Emails connected to my legal research, FOIA requests, and blog drafts are being:

  • Marked read
  • Deleted
  • Archived
  • Or missing entirely

even though the account is locked behind 2FA.

2. Erasing data from Google Docs

Entire sections of research documents — legal filings, medical timelines, staffing rosters — have vanished from Google Docs without any revision history showing who edited them.

Google Docs always shows an editor.
Unless someone is using backend access outside the consumer-facing audit trail.

That only happens under sealed law-enforcement requests or privileged backend access.

3. Deleting files from Google Drive

Drive documents related to:

  • Jail medical evidence
  • Inmate staffing logs
  • FOIA drafts
  • Exhibits
  • Photos
  • PDFs

have been deleted or moved with no traceable user activity.

You don’t bypass Drive logs without administrative-level hooks.

4. Accessing my WordPress site (LeRoyNellis.blog) and editing posts

This is the big one.

Names of EMTs, jail medics, psychiatric contractors, and staff are disappearing from individual posts — and only the names tied to liability.

Not a theme glitch.
Not a plugin.
Not an accident.

Someone with access is selectively removing the data that exposes them.

If a county will falsify jail logs to cover up harm, you think they won’t sanitize a WordPress site?

Let’s not be naïve.


Are They Getting Help From Google? The Corporate Reality Nobody Wants to Acknowledge

Here’s the uncomfortable but realistic assessment:

For someone to bypass 2FA, delete Drive files, access emails, and alter Google Docs without triggering audit logs, one of the following must be true:

A. They hacked Google itself

Not likely. Google would issue mass breach reports.

B. They compromised my device

Unlikely — the interference is too targeted and too consistent across cloud-based services.

C. They are accessing accounts through undisclosed “law enforcement access pathways”

Bingo.

Google, Meta, Automattic (WordPress), Microsoft — all maintain private back-end access channels where government agencies can request:

  • Data access
  • Account snapshots
  • Content monitoring
  • Content freezing
  • Silent edits under sealed warrants

When names being deleted just so happen to be:

  • EMTs with questionable credentials
  • Unlicensed personnel administering injections
  • Staff involved in medical neglect
  • Psych teams manipulating MHMR
  • Jail medical contractors named in FOIA requests

…that’s not coincidence.

That’s risk mitigation by deletion.


We’ve Reached the “Digital Retaliation” Stage

This level of tampering is not about cybersecurity.
It’s about liability control.

Look at the Wilco pattern inside the jail:

  • Medical charts overwritten
  • MAR logs edited after the fact
  • Suicide-watch logs falsified
  • Intake forms rewritten
  • Grievances destroyed
  • Evidence “lost” or withheld
  • Staff names redacted or hidden

What you’re seeing online is the same behavior — just executed digitally.

If they can destroy an inmate’s physical paperwork, they can silence a civilian’s digital evidence.

This isn’t fear.
This is forensic logic.


At This Point, the Real Question Isn’t “Are They Doing It?”

The question is far more strategic:

“Which agency is giving them the access?”

Because somebody is.

Counties don’t get this level of reach — unless:

  • They piggyback on a federal system,
  • They operate under an intergovernmental agreement, or
  • They file sealed law-enforcement requests through a federal partner.

And we already know Williamson County Jail operates under:

Intergovernmental contract agreements with the U.S. Marshals Service.

That’s your dual-sovereignty pipeline.
That’s the loophole.
That’s the access point.

When you combine:

federal-level access + county-level motive + political liability,
you get exactly what’s happening:

digital evidence suppression disguised as “security.”


Bottom Line

This is not paranoia.
This is pattern recognition.

Your emails.
Your Google Docs.
Your Drive.
Your WordPress.
Your FOIA drafts.
Your legal rosters.

All being altered precisely at the intersection where government liability meets public exposure.

And the more evidence you publish, the more aggressively your online footprint is being “cleaned” behind your back.

This isn’t hacking.
This is sanitization.

And it’s time to call it exactly what it is.