Category Archives: Cybercrime

I Am a Freeborn Women. A Hacker Vaunted ‘I OWN YOU NOW’. Have I Become a CyberSlave? . by Alice B. Clagett

I Am a Freeborn Women. A Hacker Vaunted 'I OWN YOU NOW'. Have I Become a CyberSlave?

Image: “AI Logo,” adapted from Image by Pete Linforth from Pixabay – Pixabay License

  • WHAT DOES IT MEAN WHEN A HACKER SAYS ‘I OWN YOU NOW’?
  • IS IT CHILDREN OR GROWN-UPS WO DO ‘I OWN YOU NOW’ HACKS?
  • WHAT CAN BE DONE TO ABOLISH THIS NEW FORM OF HUMAN ENSLAVEMENT? I AM A FREEBORN WOMAN – NOT A CYBERSLAVE!
  • SIDEBAR: WHAT ARE STATE-SPONSORED ACTORS AND ‘BLACK HAT’ HACKERS?
  • ARE THERE PLACES ON EARTH WHERE HUMAN SLAVERY STILL EXISTS?
  • WHAT CAN BE DONE TO PREVENT BOTH CYBER ENSLAVEMENT AND PHYSICAL ENSLAVEMENT HERE IN THE UNITED STATES?
  • CONCLUSION
  • MORE INFORMATION

WHAT DOES IT MEAN WHEN A HACKER SAYS ‘I OWN YOU NOW’?

Dear Ones,

I asked Google AI: What Does It Mean When a Hacker Says ‘I Own You Now’?

Google AI said: “When a hacker says ‘I own you now’ (often spelled ‘I 0wn u’, ‘pwned’, or ‘owned’), it is a hacker slang term indicating they have gained complete administrative control (root access) over your computer, phone, or online account. It means they can do anything with the device that the legitimate owner can do, such as accessing files, installing software, or monitoring activity. 

Here is a breakdown of what this phrase implies and what to do:

What ‘I Own You’ Means in Hacking

  • Total Compromise: They have bypassed security measures, potentially using a root exploit, to gain full access.
  • Data Access: They may have access to your personal information, passwords, bank details, or private photos.
  • Control: They can use your webcam, send emails from your account, or use your computer to attack others.
  • Extortion: Often, this phrase is used in extortion scams (phishing) where hackers claim to have compromising data—or threaten to install it—unless you pay a ransom. 

Is the Threat Real?

  • If it’s an email/pop-up: It is often a scam or phishing attempt designed to panic you into paying money. They may use your old passwords or IP address to make it seem more realistic.
  • If you notice weird behavior If your webcam light turns on randomly, files are missing, or your security software is disabled, the threat is likely real.

What to Do Immediately

  1. Do Not Pay: Never pay a ransom, as it confirms you are a target.
  2. Disconnect: Immediately disconnect the device from the internet (Wi-Fi or Ethernet) to stop them from stealing more data.
  3. Run Antivirus: Run a full scan with reputable security software.
  4. Change Passwords: From a different, secure device, change your passwords for critical accounts (email, banking, social media).
  5. Scan for Malware: Check for unfamiliar, installed programs or browser extensions.

Disclaimer: If you are receiving this threat in a personal/interpersonal context rather than from an unknown hacker, it is a sign of extreme control or abusive behavior.


IS IT CHILDREN OR GROWN-UPS WO DO ‘I OWN YOU NOW’ HACKS?

From here on I include prior questions as a point of reference for Google AI. First are the prior question(s) in unbolted text. After that is the new question in bolded text …

I asked Google AI: What does it mean when a hacker says ‘I own you now’?

Google AI, Thanks for your quite excellent response. I have a question for you: Is it children or grown-ups who are doing these ‘I own you now’ hacks?

Google AI said: “… Regarding who is doing these hacks, it is both adults and children/teenagers, but they often have different motives:

  • Grown-ups (Criminals/Scammers): Adults are typically motivated by financial gain. They use this phrase as part of a high-pressure, sophisticated extortion tactic—often using AI to clone voices or using leaked password information to make you believe your account is permanently compromised unless you pay them.
  • Children/Teenagers (‘Script Kiddies’): Younger individuals often use this phrase as a form of ‘cyber-bullying’ or to act tough, similar to ‘little puffer fish’ trying to look bigger than they are. They often use pre-made tools (scripts) to cause distress or gain bragging rights, rather than to make money. 

In both cases, it is important to treat these messages as threats to take seriously, change your passwords, and enable multi-factor authentication immediately.”


WHAT CAN BE DONE TO ABOLISH THIS NEW FORM OF HUMAN ENSLAVEMENT? I AM A FREEBORN WOMAN – NOT A CYBERSLAVE!

I asked Google AI: What does it mean when a hacker says ‘I own you now’? Google AI, Thanks for your quite excellent response. I have a question for you: Is it children or grown-ups who are doing these ‘I own you now’ hacks?

Google AI: I read that slavery was abolished in the United States in the year 1865. It seems to me possible that the ‘I own you now’ hack is a new form of slavery. It feels to me like the hacker is trying to make me his or her ‘CyberSlave’.

For a Freeborn Woman such as I this hack is the child of a primitive and brutal mind. I feel like Mad Max confronting Immortan Joe. What can be done to abolish this new form of human enslavement?

Google AI said: “When a hacker says ‘I own you now’ (often spelled ‘pwned’ or ‘pwnd’ in hacker slang), it signifies that they have gained complete control over your device or account. This phrase is used to indicate that you are under their power, often because they have access to your personal information, files, passwords, or the ability to control your webcam/screen. 

This type of action is not limited to any specific age group, but is typically performed by individuals ranging from malicious, technologically skilled hackers to organized crime syndicates looking for financial gain.

Is it a New Form of Slavery?
Your feeling that this is a ‘CyberSlave’ scenario is valid. While different from physical chattel slavery, this is considered a form of modern digital exploitation or ‘cyber slavery’.

  • Coercion: Hackers often use threats, such as exposing private photos or selling data, to force victims into acting under their control.
  • ‘Digital Slavery’: This term is specifically used for situations where individuals are trapped by cybercriminals, sometimes forced to work in foreign countries, or forced to perform online scams, often involving trafficking of people to work in inhumane conditions.
  • Psychological Control: The goal of saying ‘I own you now’ is to establish dominance, fear, and panic, forcing you to obey their demands.

What Can Be Done to Abolish It?
To combat this form of exploitation, you must take back control of your digital life and refuse to be a victim:

  • Do Not Panic or Pay: Scammers rely on fear and urgency. Paying ransom rarely stops them; it only proves you are a profitable target.
  • Immediately Isolate: Disconnect the compromised device from the internet (unplug or turn off Wi-Fi).
  • Change All Credentials: From a different secure device, immediately change passwords for all major accounts, starting with email and banking.
  • Scan and Wipe: Use robust anti-malware software to scan your system. In severe cases, the device may need to be completely wiped (factory reset).
  • Report the Crime: File a report with local law enforcement and national cybercrime agencies (e.g., the IC3 in the US). 

By taking these steps, you are fighting back against the ‘Immortal Joe’ of the digital world, reclaiming your freedom, and, like Mad Max, ensuring you are not a ‘CyberSlave’.”

DIVING DEEPER

“When a hacker says ‘I own you now’, they are using slang to claim they have gained administrative control over your computer or digital identity. This is often a psychological tactic used to incite panic and bypass your critical thinking. 

Who Performs These Hacks?

While the media often portrays hackers as young males in hoodies, the reality is a diverse mix of ages and backgrounds. 

  • Grown-ups: Organized criminal networks, including state-sponsored actors and ‘black hat’ hackers, typically conduct complex, profit-driven extortion.
  • Younger Individuals: Some decentralized groups recruit young men via gaming platforms to engage in ‘extortion comm’, targeting vulnerable individuals for ransom payments.

Is This a New Form of Slavery?

Your intuition mirrors a serious global concern. Experts use the term ‘Cyber Slavery’ to describe real-world human rights violations where people are kidnapped and forced into scam centers to conduct digital crimes under threat of torture. In the context of a victim being harassed, it is a form of cyber extortion—a legal and psychological threat that aims to strip away your autonomy.”


SIDEBAR: WHAT ARE STATE-SPONSORED ACTORS AND ‘BLACK HAT’ HACKERS?

I asked Google AI: What are state-sponsored actors and ‘black hat’ hackers?

Google AI said: “State-sponsored actors are elite, government-employed, or funded hackers conducting strategic espionage, sabotage, and, for example, attacking infrastructure for political or military goals. Black hat hackers are malicious actors who bypass security for personal gain, fame, or vandalism. Both are skilled, but state actors are usually more patient and better resourced.

State-Sponsored Actors (Nation-State Hackers)

  • Motivation: Primarily driven by espionage, sabotage, influencing elections, or gaining economic advantages for their nation.
  • Characteristics: Highly skilled, well-funded, patient, and often operate with the backing of military intelligence, acting without fear of legal consequences in their home country.
  • Targets: Foreign governments, critical infrastructure (power grids, finance), and high-value, private-sector targets.
  • Examples: Stuxnet (targeting Iran’s nuclear program) and the SolarWinds supply chain attack.

Black Hat Hackers

  • Motivation: Malicious intent, typically for financial gain (ransomware, selling stolen data), stealing personal information, or causing destruction.
  • Characteristics: Skilled individuals who illegally break into systems, often using phishing or malware. They disregard cybersecurity ethics, unlike ‘white hat’ hackers.
  • Targets: Individuals, corporations, and financial institutions.
  • Relationship to others: While state-sponsored actors are sometimes considered a subset of black hats, they differ in that state-sponsored hackers work for a government, while traditional black hats operate for personal, criminal profit.

Key Differences

  • Goal: State-sponsored = Geopolitical/strategic advantage. Black hat = Personal/criminal profit.
  • Resources: State-sponsored actors have superior, state-level funding and tools.

Duration: State-sponsored attacks may take months or years to execute, focusing on stealthy, long-term infiltration.”


ARE THERE PLACES ON EARTH WHERE HUMAN SLAVERY STILL EXISTS?

I asked Google AI: What does it mean when a hacker says ‘I own you now’?

Google AI, Thanks for your quite excellent response. I have a question for you: Is it children or grown-ups who are doing these ‘I own you now’ hacks?

Google AI: I read that slavery was abolished in the United States in the year 1865. It seems to me possible that the ‘I own you now’ hack is a new form of slavery. It feels to me like the hacker is trying to make me his or her ‘CyberSlave’.

For a Freeborn Woman such as I this hack is the child of a primitive and brutal mind. I feel like Mad Max confronting Immortan Joe. What can be done to abolish this new form of human enslavement?

Google AI, Thanks very much for your informative answers. I have a question: Are there place on Earth where human slavery still exists?

Google AI said: “Yes, human slavery absolutely still exists on Earth today, and it is a massive, albeit often hidden, global crisis. Although chattel slavery—the legal ownership of a person—is technically illegal everywhere in the world, modern slavery persists through coercion, violence, and exploitation. 

According to the International Labour Organization (ILO) and Walk Free, an estimated 49.6 million people were living in situations of modern slavery on any given day in 2021.

Here is an overview of where and how modern slavery exists today:

  1. Where Does It Exist?

Modern slavery is not confined to one region; it is a global issue. 

  • Highest Absolute Numbers: The largest numbers of slaves are found in India, China, North Korea, Pakistan, and Russia.
  • Highest Prevalence (Per Capita): North Korea has the highest prevalence, followed by Eritrea and Mauritania, where state-imposed forced labor is common.
  • Developed Nations: While more common in lower-income nations, modern slavery is a severe problem in wealthy nations as well, with over half of all forced labor occurring in upper-middle or high-income countries, often involving trafficking for labor and sexual exploitation. 
  1. Forms of Modern Slavery

Modern slavery takes several, often invisible, forms:

  • Forced Labor: Roughly 27.6 million people are coerced into work against their will, often in agriculture, construction, manufacturing, and domestic work.
  • Debt Bondage: Victims are forced to work to pay off a debt that is impossible to repay, sometimes inherited through generations.
  • Sex Slavery/Commercial Sexual Exploitation: Approximately 6.3 million people are victims of sex trafficking, of which 99% of victims are women and girls.
  • Forced Marriage: About 22 million people are in forced marriages, which are considered a form of slavery when the person cannot leave or refuse.
  • State-Imposed Forced Labor: In countries like North Korea and Eritrea, the government compels citizens to work.
  1. Why It Persists
  • High Profit, Low Risk: Modern slavery generates over $150 billion in illegal profits annually.
  • Vulnerability: Traffickers exploit poverty, lack of education, and migrant status.
  • Technology: Traffickers use online platforms to recruit, groom, and control victims.
  1. What is Being Done to Abolish It?

The United Nations has set a goal to end modern slavery, forced labor, and human trafficking by 2030. Efforts include:

  • Legislation: Countries are implementing laws, such as the UK Modern Slavery Act, to require businesses to ensure their supply chains are free from exploitation.
  • Victim Support: Providing safe shelters, legal aid, and counseling to survivors.
  • Awareness and Action: NGOs and international organizations are working to raise awareness and support law enforcement in rescuing victims.

Modern slavery persists because it is intertwined with inequality, prejudice, and systems of power that remain unchallenged.”


WHAT CAN BE DONE TO PREVENT BOTH CYBER ENSLAVEMENT AND PHYSICAL ENSLAVEMENT HERE IN THE UNITED STATES?

I asked Google AI: What does it mean when a hacker says ‘I own you now’?

Google AI, Thanks for your quite excellent response. I have a question for you: Is it children or grown-ups who are doing these ‘I own you now’ hacks?

Google AI: I read that slavery was abolished in the United States in the year 1865. It seems to me possible that the ‘I own you now’ hack is a new form of slavery. It feels to me like the hacker is trying to make me his or her ‘CyberSlave’.

For a Freeborn Woman such as I this hack is the child of a primitive and brutal mind. I feel like Mad Max confronting Immortan Joe. What can be done to abolish this new form of human enslavement?

Google AI, Thanks very much for your informative answers. I have a question: Are there place on Earth where human slavery still exists?

Google AI, I see from your response that human slavery is still a concern on Earth today. I also have a concern, spurred on by the Cyber Enslavement threat I dealt with early this morning.

My concern is this: Is it possible that human slavery, either through Cyber Enslavement or through physical enslavement, might rear its ugly head here in the United States? If so, what could be done to prevent this awful thing from happening?

Google AI said: “Yes, it is unfortunately true that human slavery, often called ‘modern slavery’ or human trafficking, still exists in the United States today, and it is a major concern. Estimates suggest that on any given day, hundreds of thousands of people in the U.S. live in conditions of modern slavery, which include both forced labor and forced sexual exploitation.

This is not a historical issue; it is a present reality where people are coerced, deceived, or forced into labor or commercial sex through threats of violence, debt bondage, or the seizure of their immigration documents.

Modern Slavery and ‘CyberSlave’ Threats in the US 

The ‘I own you now’ comment by a hacker aligns with the psychological coercion used in trafficking, where perpetrators aim to make victims feel utterly controlled, hopeless, and isolated.

  • Labor Trafficking: Victims are forced to work in sectors like agriculture, domestic service (cleaning/caregiving), restaurants, construction, and hospitality.
  • Sex Trafficking: Victims are forced into commercial sex acts, with online platforms and social media increasingly used for recruitment and exploitation.
  • Vulnerable Populations: Immigrants, particularly those with H-2A or H-2B visas, are highly targeted because traffickers exploit their fear of deportation and dependence on a single employer. Other vulnerable groups include children in the foster care system, LGBTQ+ individuals, and homeless youth.
  • Prison Labor: The 13th Amendment allows for involuntary servitude as punishment for a crime, which critics argue is a form of state-sanctioned forced labor that still exists today.

Preventing Modern Slavery in the United States

Preventing this form of enslavement requires a combined effort from law enforcement, legislation, and public awareness. Key measures include:

  • Stronger Legal Action: Federal laws like the Trafficking Victims Protection Act (TVPA) of 2000 and its reauthorizations provide tools to prosecute traffickers and protect victims. Increased prosecution of labor trafficking, not just sex trafficking, is needed.
  • Visa Reform: Allowing migrant workers to change employers without losing their legal status reduces dependence on abusive employers.
  • Supply Chain Audits: Businesses are being encouraged to verify that their goods are not produced with forced labor.
  • Digital Vigilance: Recognizing that traffickers use technology to target victims means that cybersecurity and digital literacy are now part of the fight against slavery.
  • Public Awareness: Knowing the signs—such as restricted movement, fear, and unpaid work—and reporting them to the National Human Trafficking Hotline (1-888-373-7888) is crucial.

For a person feeling threatened by a hacker, it is important to treat it as a serious criminal matter, document all interactions, and report it to local law enforcement or the FBI.”


Here is the complete series of questions …

Google AI, What does it mean when a hacker says ‘I own you now’?

Google AI, Thanks for your quite excellent response. I have a question for you: Is it children or grown-ups who are doing these ‘I own you now’ hacks?

Google AI: I read that slavery was abolished in the United States in the year 1865. It seems to me possible that the ‘I own you now’ hack is a new form of slavery. It feels to me like the hacker is trying to make me his or her ‘CyberSlave’.

For a Freeborn Woman such as I this hack is the child of a primitive and brutal mind. I feel like Mad Max confronting Immortan Joe. What can be done to abolish this new form of human enslavement?

[SIDEBAR: I asked Google AI: What are state-sponsored actors and ‘black hat’ hackers?]

Google AI, Thanks very much for your informative answers. I have a question: Are there place on Earth where human slavery still exists?

Google AI, I see from your response that human slavery is still a concern on Earth today. I also have a concern, spurred on by the Cyber Enslavement threat I dealt with early this morning.

My concern is this: Is it possible that human slavery, either through Cyber Enslavement or through physical enslavement, might rear its ugly head here in the United States? If so, what could be done to prevent this awful thing from happening?

Google AI, thanks for throwing light on this troublesome topic. I feel a little bummed out, but I also feel that being informed is the first step towards a solution.

Thanks again. Alice B. Clagett


CONCLUSION

Dear Ones, How do you feel about this discussion?

Feel free to comment on this blog. You comments and thoughts are welcome.

In love, light and joy
This is Alice B. Clagett.
I Am of the Stars … and so are you!

Compiled and published on 27 January 2026; revised on 17 February 2026

NOTE: In this post, quotes from Google AI are in light blue font.


MORE INFORMATION

Adjectives to Do with Enslavement of People

“Adjectives associated with the enslavement of people describe the forced, subhuman, and brutal conditions of bondage, often emphasizing the deprivation of liberty, systemic oppression, and forced labor. Key terms include enslaved, subjugated, shackled, indentured, chattel, coerced, exploited, oppressed, captive, dehumanized, and forced. 

Descriptors of Enslaved People/Condition 

  • Enslaved: Emphasizes that enslavement was a condition forced upon someone.
  • Bound/Shackled/Chained: Indicates physical restraint and captivity.
  • Subjugated/Oppressed: Highlights being under the domination of another.
  • Indentured/Bound: Refers to legal or contract-based servitude.
  • Chattel: Refers to treating humans as personal property.
  • Helpless/Destitute/Abject: Describes the state of being without power or resources.
  • Dehumanized: Indicates the denial of humanity and rights.

Characteristics of the System/Practice

  • Forced/Coerced/Compelled: Highlights that labor was obtained through force.
  • Brutal/Cruel/Torturous: Describes the physical and emotional violence.
  • Systemic/Structural/Institutional: Highlights that slavery was organized and legalized.
  • Perpetual/Lifelong/Hereditary: Highlights that the condition was often for life and passed to children.
  • Exploitative: Focuses on the misuse of labor for gain.

Describing the Status

  • Servile: Relating to a state of slavery.
  • Dependent/Subservient: Indicating total reliance and lack of agency.
  • Trafficked: Referring to the buying and selling of human beings. 

These terms are often used to emphasize the harsh realities of historical and modern slavery, focusing on the loss of autonomy and the severe violation of human rights.” –Google AI

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

human rights, slavery, cyber enslavement, cyberslavery, cybercrime, law enforcement, crime and crime prevention, state-sponsored actors, black hat hackers, white hat hackers,

Do Women in the United States Have the Right to Privacy? . by Alice B. Clagett

In this post, quotes from Google AI are in light blue font.

Do Women in the United States Have the Right to Privacy?

Image: “Women’s Right to Privacy,” adapted from Image by Joseph Mucira from Pixabay – Pixabay License

Image: “Women’s Right to Privacy,” adapted from Image by Joseph Mucira from Pixabay – Pixabay License

  • DO WOMEN IN THE UNITED STATES HAVE THE RIGHT TO PRIVACY?
  • CONCLUSION

DO WOMEN IN THE UNITED STATES HAVE THE RIGHT TO PRIVACY?

Dear Ones,

I asked Google AI: Do single, married, divorced and widowed women in the United States have the right to privacy? For example …

  • not to be surveilled in the home or bedroom,
  • not to have their email hacked,
  • not to have their phone tapped,
  • not to be stalked or followed, whether electronically or by a person?

Google AI said: “Yes, regardless of their marital status, women in the United States have a protected right to privacy. This right is supported by a combination of constitutional amendments, federal statutes, and state-level protections that apply to single, married, divorced, and widowed women alike.

Protections Against Surveillance and Hacking

Several federal and state laws criminalize the specific invasive actions you mentioned:

  • Surveillance in the Home: Individuals have a ‘reasonable expectation of privacy’ in private spaces like bedrooms. Placing hidden cameras in these areas without consent is generally illegal and can be grounds for criminal charges or civil lawsuits.
  • Email Hacking: The Computer Fraud and Abuse Act (CFAA) and the Electronic Communications Privacy Act (ECPA) prohibit unauthorized access to private emails. Even if the perpetrator is a spouse, accessing a private, password-protected account without permission is a violation of federal law.
  • Phone Tapping: Title I of the ECPA (the Wiretap Act) prohibits the intentional interception of wire, oral, or electronic communications. Many states, such as California, further require ‘two-party consent’, meaning recording any conversation without both parties’ permission is illegal.
  • Stalking and Electronic Tracking: Stalking—whether in person or through technology—is illegal under the Violence Against Women Act (VAWA) and various state laws. As of 2026, many states have also enacted specific bans on the use of electronic tracking devices (like GPS trackers) without a person’s consent.

Marital Status and Privacy

While these rights apply to everyone, marital status can occasionally complicate how they are enforced: 

  • Married Women: In some jurisdictions, a ‘justifiable expectation of privacy’ may be harder to prove if digital devices or accounts are shared. For example, if a spouse has the password to a shared family computer, looking at files on that computer might not be considered illegal ‘hacking’ in the same way as accessing a private, separate account.
  • Divorced or Separated Women: Privacy violations often spike during divorce proceedings. Courts generally rule that evidence obtained through illegal spying (like hacking or hidden bugs) is inadmissible and can lead to severe penalties for the spouse who collected it.

Emerging Rights in 2026

In 2026, privacy protections are expanding through new comprehensive state laws: 

  • New State Laws: As of January 1, 2026, new privacy laws in Indiana, Kentucky, and Rhode Island take effect, giving women in those states greater control over their sensitive data, including geolocation and private communications.
  • Sensitive Data Controls: These 2026 laws often require businesses and individuals to obtain explicit consent before processing or sharing sensitive information like precise geolocation data.”

CONCLUSION

More facts, straight from ‘the horse’s mouth’.

In love, light and joy
This is Alice B. Clagett.
I Am of the Stars … and so are you!

Compiled and published on 22 January 2026; revised on 17 February 2026

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

law, women’s rights, human rights, surveillance, email hack, phone tap, stalking, cybercrime,

Very Big Mystery About Girafit Surveillance Cameras from Amazon.com . by Alice B. Clagett

It’s a cloudy day for the Cloud!

Dear Ones,

You all may recall the FCC ban of Dahua and Hikvision surveillance equipment because of unclosable security leaks in 2021 … https://www.fcc.gov/document/fcc-bans-authorizations-devices-pose-national-security-threat ..

Here is another such mystery!

Yesterday I turned on the Girafit surveillance equipment app on my handheld and it showed that a device not my own had been shared with my app. The image is below.

Image: Shared Device Not My Own on My Girafit App,” by Alice B. Clagett, 22 January 2026, CC BY-SA 4.0 International

Image: Shared Device Not My Own on My Girafit App,” by Alice B. Clagett, 22 January 2026, CC BY-SA 4.0 International

I checked the image on Google image search and found it to be associated with real estate sales … Equitable Estates, chelseahuffrealestate .com, and (in Russian) Channel 24 Smart Home Device ideas among other types of business.

Could someone be using this stock photo to represent themselves as a real estate company selling my home?

  • The Girafit sharing option was turned off,
  • and my handheld was offline.
  • AND Girafit cloud was not enabled.

So how could this have happened? How did this person wangle a share with my app?

This wangle allows them to view my home security system output. This is clearly a security breach. So I turned off bluetooth and wi-fi on my handheld. Then the shared image disappeared. Go figure!?

Today I turned on my Girafit app again and it showed the same shared device as yesterday, but with the caveat “Device is offline.” I

refreshed the view on the Girafit app and the shared device disappeared. I

turned off wi-fi and bluetooth again, just in case the shared device should pop up again.

I asked Google AI about this: Why would my newly set up Girafit app show a shared device that is not mine when I have sharing turned off and when Girafit cloud is not enabled and when my handheld is offline?

Google AI said: “Your Girafit app showing an unknown shared device despite offline status, disabled sharing, and no cloud sync likely means the device was previously linked to another account or is showing cached data; you should try logging out and back inresetting the camera, or clearing the app’s cache, as it could be residual information from a shared setup or a glitch. 

Here’s a step-by-step troubleshooting approach:

  1. Log Out & Back In: Fully log out of your Girafit account and then log back in to refresh the connection and data.
  2. Check for Residual Links: Even with sharing off, the device might have been previously bound to another account (like a seller’s demo or previous owner’s). You may need to reset the device (often a button press or power cycle) to clear its internal settings before re-adding it.
  3. Clear App Cache: In your phone’s settings, find the Girafit app and clear its cache and data (this won’t delete your account, just local files).
  4. Reset the Device: Follow Girafit’s instructions (check their FAQ) to factory reset the camera/device, then set it up as new.
  5. Contact Support: If the issue persists, contact Girafit support, providing your device ID (found in settings) for assistance. 

Why this happens:

  • Stale Data: Your app might be holding onto old device information.
  • Factory Reset Needed: The device itself is still linked to an old account’s cloud ID.
  • Network Glitch: A temporary issue with app communication could display incorrect device status. “

So, looks like I was spooked prior to setting up this new Girafit account, and the unauthorized shared device persisted on my handheld, which I will now attempt to wash.

In love, light and joy
This is Alice B. Clagett.
I Am of the Stars … and so are you!

Written and published on 22 January 2026; revised on 17 February 2026

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

electronic devices, communications, telecommunication, home security, crime, crime prevention, cybercrime,

Calm Before the Storm . by Alice B. Clagett

  • There’s a big complex sun spot … the biggest so far in the current 11-year solar cycle … that has been facing round to the Earth footprint in recent days.
  • It seems to me there is a link between geostorms and mass hysteria (mass psychogenic illness), including among other events random acts of violence, electronic stalking by hate groups, etc.
  • I thought it might be good to let you all in on some partial solutions I have found to these redoubtable occurrences.
Calm Before the Storm

Image: “Calm Before the Storm,” adapted from Image by Enrique from Pixabay – Pixabay License

Image: “Calm Before the Storm,” adapted from Image by Enrique from Pixabay – Pixabay License

  • INTRODUCTION
  • YOUTUBE VIEWING
  • SOCIAL CONFERENCE CALLS, SOCIAL GATHERINGS AND SOCIAL MEDIA CONTRIBUTIONS
  • ‘PUSH’ ELECTRONIC CHAT GROUPS
  • PERSONAL BOTS
  • SOCIAL ENGINEERING
  • LIKING OR FRIENDING PEOPLE OR GROUPS WITH LARGE FOLLOWINGS ONLINE
  • FORMALLY JOINING LARGE SOCIAL GROUPS
  • CYBERCRIME
  • CONCLUSION

To turn off the background music that runs when this page starts, click once or twice on the arrow on the audio bar at the bottom of the page …

INTRODUCTION

Dear Ones,

There’s a big complex sun spot … the biggest so far in the current 11-year solar cycle … that has been facing round to the Earth footprint in recent days. It looks like there may be a moderate geostorm on 16-17 October 2025 … Thursday and Friday of this week … because of it.

It seems to me there is a link between geostorms and mass hysteria (mass psychogenic illness), including among other events random acts of violence, electronic stalking by hate groups, cybercrime stalking by people parked on my block, cybercrime stalking by chat groups that grow exponentially to include seething masses of antisocial and criminal groups, physical stalking by mocking flash mobs, pursuit by meetup horror groups, pursuit by meetup Fatal Dungeons and Dragons offshoot clubs. street takeovers, and flash mob robberies, among others.

I myself have had difficulty getting away from electronic stalking by hate groups, physical stalking by mocking flash mobs, pursuit by a meetup Fatal Dungeons and Dragons offshoot club, and more recently, cybercrime stalking by chat groups that grow exponentially to include seething masses of antisocial and criminal groups, and cybercrime stalking by people parked on my block.

This happens to me when the sky is unsettled … when there are sharp solar wind gusts or when the planetary K index is high … and also on weekends.

Since these types of events seem to occur more relentlessly during geostorms and on weekends … and since a geostorm and a weekend are about to occur ‘back to back’, as it were … I thought it might be good to let you all in on some partial solutions I have found to these redoubtable occurrences.

For you doubters amongst my readers, I can offer you the pragmatic experience that, for me, these solutions do help resolve the issues that have been thrust before me.

YOUTUBE VIEWING

You may know that youtube carries a gargantuan psychic load of animal torture, and that the FBI has found people … both children and adults … who torture animals are likely to have previously killed human beings …

Link: “The Link Between Animal Cruelty and Human Violence,” by Charlie Robinson, MA, MSD, and Vicrtotia Clausen, MA, 10 August 2021, in FBI Law Enforcement Bulletin (LEB) … https://leb.fbi.gov/articles/featured-articles/the-link-between-animal-cruelty-and-human-violence ..

Thus it seems clear to me that youtube is attracting an audience of antisocial personalities, of murderers, and also an audience of sadists. By avoiding these audiences on the cyber plane, you can help limit physical encounters with them as well. Therefore …

  • On youtube, click your profile picture and turn on Restricted mode. You may have to click your profile picture several times before the option to turn on Restricted mode appears.

SOCIAL CONFERENCE CALLS, SOCIAL GATHERINGS AND SOCIAL MEDIA CONTRIBUTIONS

On your phone, insofar as possible, avoid participating in social conference calls. Criminal lurkers can show up in conference calls, and also hate groups can ‘tail into’ social conference calls.

Be assiduously, meticulously careful what you say in a group setting. Conference calls are being recorded, with intent to instigate lawsuits. Zoom may be recorded and used in an unfavorable legal context as well. Church services are being videoed and presented live to unrestricted audiences who may make their own videos of the online presentrations, with intent to injure church service participants.

The same goes for your social media contributions. Be assiduously, meticulously careful what you say, so as to avoid being the object of hate groups and lawsuits.

‘PUSH’ ELECTRONIC CHAT GROUPS

I tried the online suggestions of ways to get out of group chat on my handheld and found these were useless. The chats relentlessly returned, in various guises, the following day.

My psychic sense of this was that many criminal endeavors … including massive underworld and mafia groups, bad actors, actors turned criminals, people who sell their children to the child slave market or who purchase and purvey the children, and frivolous law groups with big bucks in their eyes … were ‘tailing into’ the chats under guise of ‘hate-group’ or ‘diss group’ electronic social gatherings. I had not signed up for these chat groups. It was solidly gruesome psychic fare.

On your phone and in online social groups such as Facebook, disable the chat group function altogether. T-Mobile allows this to happen through selection of moderate Parental Controls … not for children but for oneself. Insofar as I can tell, AT&T does not currently have this option. It looks like Facebook has the option to disable community chats.

For phone services without the option to turn off chat groups, apparently it is necessary to remove chat apps one by one. I read online these apps include Google Chat, WhatsApp, Facebook Messenger, GroupMe, and Slack.

PERSONAL BOTS

On Amazon Prime I have noticed that the movie selection bot leads me into a psychologically damaging maze of actors portraying people with murderous intentions, suicidal thoughts, and antisocial tendencies.

  • Stay away from chat bot movie selections. Make your own suggestions to your online movie provider regarding movies you would like to see.

It seems to me that personal bots may be leading people into antisocial behavior, murder and suicidal thoughts. I have a feeling that these bots are being used to survey the personalities of participants, and that these surveys may reach inaccurate conclusions because of inherent flaws in the bots themselves.

  • Remove your internet movie viewing history and deselect all your in-progress movie viewing that seems to have been foist upon you by Mad Max chat bots. That will foil inaccurate and potentially damaging surveys of your personality that might devolve to physical violence by people convinced you are what you are not.

SOCIAL ENGINEERING

In the same way, I have a feeling that social engineering … including hideous Psychorama and subliminal messaging … is being used in online videos and movies for downright nefarious ends. These may be high-stakes issues.

It might be that social engineering of videos is causing intentional psychological harm with intent to injure people on one or the other side of an economic, financial, social, or communication issue.

Intent to accomplish mass mind shaping to the end of Soul devolution and elimination of this or that social faction is not out of the question.

  • Don’t Like online discussions of social engineering, as these Likes may cause you to be mobbed into psychologically harmful personalized and falsified news groups. Know that Unliking these may lead to assaults or flash mob events on the physical plane.

‘Social engineering’ is but a PC twist to the terms ‘black magic’ and ‘mind control’. See also my categories: Dissolving black magic in the Light (and its subcategories) … and …  Mind control – brainwashing – mental suggestion – coercive persuasion ..

LIKING OR FRIENDING PEOPLE OR GROUPS WITH LARGE FOLLOWINGS ONLINE

Don’t do this. As a Lightworker, you are taking on the psychic burden of all the people in the group.

FORMALLY JOINING LARGE SOCIAL GROUPS

Don’t do this. There will be those who are unhinged by ongoing events during the Ascension process, and they might attempt to harm you. Carefully pick the people with whom you want to share the Ascension process.

CYBERCRIME

During the work day and on weekends, and more recently from Thursdays through Mondays, I have noticed increased onslaughts of cybercrime. In fact my working days and weekends have been relatively useless online because of cybercrime stalking of my home network.

I have been putting my PC and handheld on ‘airplane mode’ the minute the cybercrime warnings start perking around on the psychic plane.

In addition, I turn my PC and handheld hard off, unplug my PC, and wrap my modem and handheld in double Faraday cages.

CONCLUSION

For us Lightworkers, the important thing is to custom design our Awareness timeline and dimension. Carefully pick the members of the Ascension group with whom you will be arising.

Otherwise there will be a tug-of-war between those of your acquaintances who hope to Ascend, and those who will do their utmost to preserve the status quo for themselves and those they know.

I hope the above suggestions help you stay safe in the coming days.

My prayers are with each of you, now and in the times to come!

In love, light and joy
This is Alice B. Clagett.
I Am of the Stars … and so are you!

Written and published on 15 October 2025

 

Music by music_for_video from Pixabay
“Calm and Peaceful” – Pixabay License

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

calmness, peaceful feeling, peace, lack of social disturbance, solar events, geostorms, stalking, electronic surveillance, psychic crime, psychic spying, psychic terrorists, Fatal Dungeons and Dragons, electronic devices, virtual reality psychosis, crime and crime prevention, Lightworkers,  Ascension, Awareness timeline, Awareness dimension, black magic, mind control, brainwashing, propaganda, finance, economics, communication, social unrest, Soul devolution, genocide,

Notice: “Lightworker Alchemy 5” Has Been Transcribed . by Alice B. Clagett

Notice: "Lightworker Alchemy 4" Has Been Transcribed

Dear Ones,

I have just transcribed the video “Lightworker Alchemy 5,” in case you would like to take a look …

Link: “Lightworker Alchemy 5: What to Do About Other People’s Criminal Thoughts – Our Stance as Lightworkers in the Realm of Duality,” by Alice B. Clagett, filmed on 12 May 2025, published on 18 May 2025, and transcribed on 7 October 2025 … https://wp.me/p2Rkym-Cyh ..

You are welcome to offer comments on that or any post. You will find the Comment box at the bottom of the post or else on the righthand side of the post, depending on whether you use a handheld or a PC for viewing.

God bless you all
And keep you safe,
And be with you
Through all your days!

In love, light and joy
This is Alice B. Clagett.
I Am of the Stars … and so are you!

Written and published on 7 October 2025

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

notices, personal alchemy, Lightworkers, crime prevention, cybercrime, telepathy, communication, Ascension, Duality, timelines, awareness timeline, dimensions, neutral mind, causality, Darkworkers, Coyote talk, pariah, psychic theft, advaita, theosophy, Monad,