Thanks for your quick reply. Regarding the interception I can tell through the use of Green Extended Validation SSL websites. If you go to a known Green EV site and the green bar is missing, you know your SSL is being intercepted. Here is a good explanation of it from
https://www.grc.com/ssl/ev.htm)
I switched from my wired network behind a firewall to a mobile broadband USB internet stick, thinking that would help. It hasn't. My browsing while in Guest Mode continues to be intercepted. This is a picture I just took of
https://protonmail.ch which is a green EV SSL website which you can check out yourself. Here is what it looks like on my Chromebook in Guest Mode right now: IT IS MISSING THE GREEN EV BAR... so that means I'm being intercepted. This happens regularly, but not with forged certificates.

I am connected to the Internet via a broadband internet stick with no wifi. It is cellular. I believe that means it is either from the ISP or from inside my Chromebook (which I just reformatted the OS and updated things in the last hour.)
I can see the effects from the data leak and am just trying to isolate where it is coming from. It feels, like my Sandbox has been disabled and there is a backdoor allowing third party access to my data. On Chrome://sandbox it tells me SUID Sandbox status is No. I think that is normal but wanted to let you know just in case.
Finally, when I check my Chrome://device-log I see a USB device called SunplusIT which is an HD webcam listed there.
USBUser[21:31:34] USB device added: vendor=7119 "SunplusIT Inc", product=11367 "HD WebCam", serial="", guid=01FB7571-993C-4958-845D-3ED5BAA65E18
My questions are: How can I verify 100% my sandbox is working? I have only got my USB internet stick added to my Chromebook with a cellular connection, nothing else, yet the interception continues.
So for this interception to be happening from what I know I can see three options (maybe you see more):
1) from inside my Chromebook (maybe i downloaded a malicious version of the OS to reformat my system from, or someone in Google is providing a backdoor maybe),
2) from my ISP intercepting my communication or
3) DNS poisoning.
I think it is one of the first two, but would like advice on how to eliminate all from suspicion. As for the Google employee thing, as strange as it sounds, this is exactly how this opponent attacks targets- they find out your vendors and recruit employees to help access your data. I'm not saying it is the case, but is it even possible for someone inside of Google to control someone's Chromebook?
Additional question:
Is it normal to see this HD webcam connected to my system via USB automatically during system start up? Is this the Chromebook's webcam just loading up?
I would appreciate any and all guidance. Trying to defend yourself from people while they are intercepting your communication has been very challenging.
Thank you.