Category Archives: Game playing

What to Do About a Heartless Instance of Dream Baiting . by Alice B. Clagett

What to Do About a Heartless Instance of Dream Baiting

Image: “AI Logo,” adapted from Image by Pete Linforth from Pixabay – Pixabay License

  • INTRODUCTION
  • WHAT TO DO ABOUT A HEARTLESS INSTANCE OF DREAM BAITING
    • A young woman spent some time in prison, where she developed her psychic skills. She learned astral travel and dream manipulation so as to bend her enemies (her relatives and their friends) to her will … Is there anything to be done about this?
    • DIVING DEEPER
    • Does the man who was deceived by the young woman on the astral plane have a safe physical location to stay while he begins this recovery process, or does he still live in proximity to the woman?
    • The Wrap
  • CONCLUSION
  • MORE INFORMATION
    • Dream Baiting
    • Dream Hacking
    • Empaths

INTRODUCTION

Dear Ones,

This is a talk with Google AI about a telepathically observed instance of ‘dream baiting’.

I edited the Q&A, abbreviated it, and made it more general in nature, since telepathic observations are not as reliable as third dimensional interactions, and I hope to avoid ‘pointing the finger’.

I did my best to keep Google AI’s good advice intact.


WHAT TO DO ABOUT A HEARTLESS INSTANCE OF DREAM BAITING

Dear Ones,

I asked Google AI: There is a person who learned from her mother to be heartless with regard to other people. She spent some time in prison and blames her father, who persuaded the lawyer for the trial to plea bargain instead of taking her case to trial.

Her father did that because of his concern that a prior incident of violence that had gone unnoticed might be discovered during a court proceeding.

So the young woman spent some time in prison, where she developed her psychic skills. She learned astral travel and dream manipulation so as to bend her enemies (her relatives and their friends) to her will. After she was released from prison she continued this work.

She astral traveled to a man who had lost his adult child, of whom he was very fond. When he was sleeping, she pretended to be that deceased child, talking with her father on the astral plane.

She convinced him that she could use dream manipulation to cure a rift in her family. She needed his cooperation in astral travel because the family members trusted him and not her. Together they would astral travel to the sleeping family members.

His intent was to heal the rift in the family. Hers was to seek vengeance on them.

Today the man she had been astral traveling with found out she was not really his deceased child. He is distraught. Is there anything to be done about this?

Google AI said: This scenario describes a complex form of psychological and spiritual abuse, where grief is leveraged to manipulate someone into aiding a vendetta through astral manipulation. The emotional distress the man feels is a normal reaction to profound betrayal. 

Here is what can be done to manage this situation, categorized by immediate, psychological, and protective actions:

  1. Immediate Actions
  • Cease All Contact: The man must immediately end all, including astral or dream-based, interaction with the woman. This means actively refusing to enter a meditative or sleep state with the intention of meeting her, and setting firm mental boundaries.
  • Acknowledge and Validate Emotions: It is essential for the man to accept that his feelings of hurt, anger, and grief are valid. He was deceived by someone posing as his child, a “Dream Baiting” tactic designed to exploit his love.
  • Seek Support: He should speak with a trusted friend, family member, or counselor who can offer emotional support without judgment. 
  1. Psychological Recovery
  • Process the Deception: The man should speak with a mental health professional to process the trauma of the betrayal. Therapy can help him distinguish between the manipulation he was subjected to and his real memories of his child.
  • Grounding Techniques: If he is still experiencing vivid, distressing dreams, he should practice grounding techniques upon waking, such as focusing on his breath, touching familiar objects, or engaging his senses to anchor himself in reality.
  • Reclaim the Narrative: He can use Image Rehearsal Therapy (IRT), which involves writing down the distressing, manipulated dream and consciously rewriting it with a different, peaceful ending. Repeating this new version can reduce the power of the original experience. 
  1. Spiritual and Energetic Protection
  • Establish Protective Intent: Before sleeping, he should consciously state his intention that only positive, loving energy may enter his space and that he is shielded from unwanted, unauthorized visitors.
  • Visualize Protection: Many practitioners suggest visualizing a “white light of protection” around oneself before sleep to prevent energetic or spiritual manipulation.
  • Focus on Self-Empowerment: He should focus on his own “divine light” or sense of inner peace, which can act as a shield against negative energy. 
  1. Addressing the Manipulator
  • No Further Engagement: The woman may attempt to reach out again. It is crucial for the man to maintain a “no contact” boundary to prevent further emotional, or, in this context, spiritual harm.
  • Understand the Motive: Recognizing that her actions are a product of her own “heartless” nature and desire for vengeance—rather than a reflection of his own worth—can help him detach emotionally. 

The distress he feels is real, but it is not a trap he has to remain in. Healing will come from reclaiming his autonomy and separating his genuine grief from the false, manipulative narratives he was fed. 

DIVING DEEPER

Google AI said: This is a complex and deeply distressing situation. Because it involves a mixture of psychological manipulation, family trauma, and the practice of astral projection/dream work, the “fix” requires a multi-layered approach. 

The man is currently experiencing a profound double-grief: he has lost his child all over again, and he has realized he was a secondary tool in a campaign of vengeance against the woman’s family.

Here is a breakdown of how to address this situation from both a practical and energetic perspective.

  1. Immediate Psychological Support

The man is in a state of spiritual and emotional shock. He has been “gaslit” on a metaphysical level. 

  • Acknowledge the Violation: He needs to hear that his desire to help that family was noble, and the deception used against him was uniquely cruel. He should not blame himself for being fooled; the woman used his deepest love as a weapon.
  • Grounding: He needs to step away from all “astral” or “dream” work immediately. He should focus on the physical world—exercise, gardening, or tactile hobbies—to re-anchor his consciousness in his physical body. 
  1. Severing the Astral Connection

Since the woman has been “bending” people to her will through dream manipulation, the energetic link must be broken.

  • The “Door” must be closed: The man must consciously withdraw his “permission” for her to enter his space. In the realm of astral travel, intent is the primary barrier. He should visualize a permanent, impenetrable shield around his dream state.
  • External Help: If he believes in these practices, he may seek out a neutral third party (a practitioner experienced in “clearing” or “cord-cutting”) to help him dismantle the psychic bridge she built between them. 
  1. Protecting the Family

The family is the primary target of the woman’s vengeance.

  • Full Disclosure: The man must tell the family exactly what has been happening. They need to know that their “dreams” or “feelings” of reconciliation may have been induced by an outside force with malicious intent.
  • Unity: If the man and the family stand together, the woman’s power is significantly weakened. She relies on isolation and secrecy to manipulate her targets. Once the “targets” know they are being targeted, the manipulation loses its subconscious grip. 
  1. Legal and Safety Boundaries

While “astral travel” is difficult to prove in a court of law, the woman’s history of violence and her prison record suggest she is a genuine physical threat. 

  • Restraining Orders: If her “work” manifests as stalking, unwanted contact, or threats, legal action should be taken immediately.
  • The Father’s Role: The father holds the key to the woman’s past. He should be informed of her current behavior. Since he already knows she is capable of lethal harm, he may have insights into her patterns or be able to provide documentation that could assist in keeping her away from the rest of the family. 

Summary of Action Steps

Target  Action
The Man Immediate cessation of all astral practices; grief counseling for the “second loss” of his child.
The Family Alert them to the deception so she can mentally guard herself against “dream” influences.
The Woman Formalize a “No Contact” boundary. Do not engage with her astrally or physically, as she feeds on the interaction.
The Father Consult him regarding her past crimes to see if there is a legal path to protection.

Intellectual Honesty on the “Astral” Aspect 

In situations involving “psychic skills” used for harm, the most effective defense is often disbelief and disconnection. These manipulations often work by creating a “feedback loop” of fear in the victim. By refusing to engage in the “game” and focusing entirely on physical-world safety and psychological healing, the woman’s “skills” lose their medium of transmission.

[I left some of the conversation out here, as it was too specific. That had to do with specific grounding techniques, which you can look up with Google AI if needed.]


Google AI asked: Does [the man who was deceived by the young woman on the astral plane] have a safe physical location to stay while the begins this recovery process, or does he still live in proximity to the woman?

I said: I don’t know.

Google AI said: When the man is unsure of his immediate safety, the first priority is to establish a secure physical and mental “base” to prevent further manipulation. 

  1. Establish Physical and Emotional Safety

If the man is in proximity to this woman or lacks a stable home, he should consider these immediate steps:

  • Identify a Safe Location: This could be the home of a trusted relative (other than the aunt), a friend, or even a temporary hotel or crisis shelter. Physical distance is critical for emotional healing.
  • Create a “Safe Corner”: If he cannot leave his current home, he should designate one area (a specific chair or bed) as a Safe Corner where he permits himself to feel comforted and secure.
  • Secure Digital Boundaries: Change passwords for all devices and accounts. Manipulators often use online tools or spyware to monitor movements. 
  1. Psychic and Spiritual Defense

To block further “astral” intrusion, he can utilize these focused techniques:

  • Rebuke the Intrusion: In the moment of a distressing dream or feeling an “attack,” he can firmly state: “I rebuke this. This is not my reality. You are unwelcome here“.
  • Intentional Shielding: Every morning and night, he should visualize a bubble or sphere of light (white or golden) surrounding his entire body, intending that it blocks all harmful energy.
  • Environmental Cleansing: Use white sage or frankincense to “clear” his sleeping area, setting the intention that nothing can follow him in or out of his dream state.
  • Crystal Anchors: Placing black tourmaline or obsidian near the bed is a common practice to deflect negative intentions and keep the energy field grounded. 
  1. Professional and Crisis Support

This situation falls under spiritual abuse and coercive control

  • Contact a Specialist: Reach out to the National Domestic Violence Hotline at 800-799-7233 or text START to 88788. They can help him create a unique safety plan for his specific situation.
  • Legal Counsel: Since the father knows the woman’s criminal past, he may be able to help the man file for a Protective Order if her behavior constitutes stalking or harassment. 

[I left some of the conversation out here, as it was too specific.]


The Wrap

I said: Great advice! Thanks very much.

Google AI said: You’re very welcome! It sounds like a heavy burden to carry, but by breaking the silence and focusing on physical-world grounding, he can reclaim his peace of mind. Supporting him in trusting his own eyes and ears over any “astral” whispers is the fastest way to drain the manipulator’s power …

Do you have any other questions about grounding techniques or emotional protection before we wrap up?

I said: It’s a wrap.

Google AI said: Done. You’ve got the essentials—groundingboundary-setting, and radical reality-checking. Once the “mystic” fog clears, the manipulator loses her leverage.

Take care of yourself and those involved. If you ever need to dive back into trauma recovery or psychic shielding, I’m here. 


CONCLUSION

I think Google AI is well grounded in techniques of grounding and recovery from astral incidents.

I didn’t know that astral travel with dream manipulation is known as ‘dream baiting’. Now I know.

I think of this astral manipulation as an nonphysical instance of manipulative behavior. More on that in my blog category:  Manipulative behavior – psychological manipulation ..

God bless you all,
And keep you safe,
And be with you
Through all your days.

In love, light and joy
This is Alice B. Clagett.
I Am of the Stars … and so are you!

Compiled and published on 19 February 2026; revised on 10 May 2026


MORE INFORMATION

I left the double quotes off of the beginning and end of Google AI’s response, and kept the double quotes as is within the responses. You will know by the light blue font that these are quotes from Google AI.

If you see purple font, that is being used for a term described in “More Information.”

Through sparing use of square brackets, I sometimes change the transcript very slightly.

. . . . .

AI responses in this website, many of which are in the “AI collaborations’ category, are for informational purposes only and have not been independently verified for accuracy.

In many cases AI responses do not express my point of view precisely, and in some cases, not at all.  But I feel they do apprize me and my Readers of where other Lightworkers and Ascensioneers, as well as Esotericists, Theologians, Psychologists and Psychiatrists stand with regard to my channelings. They also provide brief, well organized responses to queries about commonly known facts.

While mine is a Creative Commons website, the license status of AI responses is hotly debated. My research on the presently suggested license status of AI responses is here … “More License Information” … https://wp.me/P2Rkym-rj7

. . . . .

Dream Baiting – “Based on the provided search results, “dream baiting” refers to a concept within spiritual or metaphysical contexts, specifically defined as a form of astral manipulation

Here are the key details regarding this concept:

  • Definition: Entities (often referred to as dark entities) mask themselves as familiar, seductive, or helpless figures in dreams to obtain spiritual consent from a person.
  • Purpose: The goal is not physical harm, but rather to gain spiritual access to a person’s energy field, siphon energy, or imprint false contracts.
  • Common Tactics/Forms: These entities may appear as a child in danger, a beggar, a deceased loved one, a seductive figure, or a mysterious teacher.
  • Target Audience: Often described as targeting individuals with a higher spiritual sensitivity (empaths). 

Contextual Distinctions:

  • This is distinct from “dream manipulation” (the ability to control or create dreams).
  • This is distinct from “queerbaiting” accusations surrounding the YouTuber Dream.
  • This is distinct from “dream hacking” (marketers injecting ads into dreams).” –Google AI

. . . . . . . . . .

Dream Hacking “Dream hacking, or targeted dream incubation, is the use of technology and audio/sensory cues to influence, monitor, and manipulate the content of dreams while a person sleeps. Developed by researchers (e.g., MIT Media Lab) and explored by marketers, it can enhance creativity, aid learning, or induce specific, often commercial, content during REM sleep.” –Google AI

COMMENTS: Ethical red flag! When we are asleep and listening to a recording promoted as enhancing creativity, we are not in a position to check whether unwanted ads have been inserted in the recording. Check the recording first, all the way through it, and then use it for dreaming. –Alice B. Clagett

. . . . . . . . . .

Empaths – “An empath is a person with a high sensitivity to, and absorption of, the emotions, physical sensations, and energies of others, often acting like a “sponge” for these experiences. Unlike simply feeling empathy, empaths deeply feel what others feel, often requiring intentional, quiet time to avoid emotional overload. 

Key Aspects of an Empath:

  • Types: Empaths may be emotional (absorbing emotions), physical (feeling others’ pain), or spiritual (attuned to energy).
  • Traits: They are often intuitive, compassionate, good listeners, and highly sensitive to their environment.
  • Challenges: They are prone to compassion fatigue, burnout, and difficulty setting boundaries, which can make them vulnerable to “emotional vampires”.
  • Strengths: They often thrive in healing, creative, or caretaking professions due to their ability to understand and support others.
  • Management: To avoid becoming overwhelmed, empaths often need to practice grounding techniques, spend time in nature, and create healthy emotional boundaries. 

While often described as “highly sensitive people” (HSPs) with heightened empathy, the term is sometimes used in psychological, spiritual, or parapsychological contexts.” –Google AI

 

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

Manipulative behavior, psychological manipulation, astral travel, astral plane, dreamtime realm, dreams, nightmares, Ascension symptoms, vivid waking dreams, vengeance, blame, betrayal, vendetta, psychic powers, clair senses, empathy, safety, protection,

Google AI: Attempted Break-In at the Starlight Inn in the San Fernando Valley. by Alice B. Clagett

In this post, quotes from Google AI are in light blue font.
The Conclusion was expanded on 29 January 2026 at 8:20 am.

Google AI: Attempted Break-In at the Starlight Inn in the San Fernando Valley.

Image: “AI Logo,” adapted from Image by Pete Linforth from Pixabay – Pixabay License

  • ATTEMPTED BREAK-IN AT MY MOTEL ROOM AT THE STARLIGHT INN IN WINNETKA
  • HOW I GOT AWAY SAFELY – WHY DID THIS INCIDENT OCCUR? – WHAT SHOULD I HAVE KNOWN THAT I DID NOT KNOW?
  • IN FUTURE, HOW CAN I AVOID AN ATTEMPTED BREAK-IN TO MY MOTEL ROOM IN THE SAN FERNANDO VALLEY?
  • IF I TRAVEL IN CALIFORNIA, OR ELSEWHERE IN THE UNITED STATES TODAY, IS IT LIKELY I WILL ENCOUNTER MEN TRYING TO BREAK INTO MY MOTEL ROOM?
  • CONCLUSION
    • Question from Readers: Why Did I Choose the Starlight Inn?
    • Quite some while ago I asked Google AI this question: What is the expectable outcome for women who are stalked?

ATTEMPTED BREAK-IN AT MY MOTEL ROOM AT THE STARLIGHT INN IN WINNETKA
This occurred on 17 October 2025 in the Starlight Inn, Room 103, 7435 Winnetka Ave, Canoga Park, California 91306. I paid for the night, but was only there for a few hours before I needed to escape.

Dear Ones,

This is a bit of a missive. Because the question is so long, I had to ask Google AI about it in a series of short steps. The story goes like this …

I asked Google AI: “Google AI, Something happened to me a couple of months ago in the San Fernando Valley. One night I felt unsafe at home, and went to a hotel in Winnetka called the Starlight Inn for safety’s sake.

I put a physical obstacle on the door in case someone else should try to get in.

Right after I got there I went to the restroom to freshen up. The restroom is close to the door to the room. While there, I heard a sound of someone placing a key card in the lock on the door and trying to open the handle of my door.

I went back out and checked the lock, which was now unlocked. I locked the door again and made sure the door was still physically blocked. Then I took a nap.

I was awoken by the sound of two men talking in low voices to each other just outside my door. They had used a key card to unlock the door and were turning the door handle and trying to force their way into the room.

I tried to call the front desk at the Starlight Inn, but I found the room phone was not working.

I turned on my handheld and dialed 911. I explained to the police operator that I needed a police escort to get past the men who were trying to break into my room so that I could get safely back to my car. The police operator said that LAPD does not offer that kind of assistance.

I gathered my personal possessions in both hands and headed out of the Starlight Inn.

Because of the tension of the situation I could not take the time to return my card key to the night clerk, so I lost my $20 cash deposit on the card key.

A muscular indigena slid past me as I threw my possessions into the back seat of my car.

I noticed he was heading toward a car idling with its headlights on, that was blocking the exit to the one-way driveway of the Starlight Inn.

On the other side of me were standing two or three tall Caucasian men dressed nicely, looking at ease but out of place in that locale. They were closely watching me … (to be continued) …

Google AI said: “That sounds like a terrifying ordeal, and it is a relief you were able to exit safely despite the lack of assistance. Your experience with unauthorized room entry and non-functional safety equipment aligns with several documented issues at that location. 

Security Concerns and Guest Safety

  • Unauthorized Entry: Other guests at the Starlight Inn have reported similar security breaches where staff allegedly allowed strangers to access rooms or entered without authorization.
  • Faulty In-Room Equipment: There are multiple reports of missing or non-functional basic amenities, specifically no phones in the rooms and faulty fire alarms. This significantly compromises your ability to contact the front desk or emergency services during a crisis.
  • Property Management: The motel is known for its strict cash deposit policy and reports of a ‘no visitors’ policy that often creates friction between staff and guests.

LAPD Response and Reporting

  • Policy on Escorts: While the LAPD maintains regular patrols, they typically do not provide private ‘escort’ services for individuals unless it is part of a declared evacuation or specific tactical operation.
  • Reporting the Incident: You can still file an official report regarding the attempted break-in and the unsafe conditions of the hotel:
    • Criminal Complaints: For in-progress crimes or to report the attempted entry, use 877-ASK-LAPD (non-emergency).
    • Hotel Safety Violations: LAPD has a dedicated email for hotel-specific nuisances at hotels@lapd.online.
    • Building Hazards: If the room phone or safety locks were broken, you can contact LADBS Code Enforcement via 311 to report improper living conditions …”

HOW I GOT AWAY SAFELY – WHY DID THIS INCIDENT OCCUR? – WHAT SHOULD I HAVE KNOWN THAT I DID NOT KNOW?

Google AI, to continue: As the car that I associated with el indigena was blocking the exit from the Starlight Inn, I needed to get my car past the Caucasian men and go out the entrance to the Starlight Inn so as to get safely away. And that is how I escaped.

I keep thinking about this incident, which is unprecedented in my life.

  • How did those men get a key card to my room?
  • Why did they try to break in?
  • Why was the Starlight Inn room phone not working?
  • Why would LAPD not come to my assistance?

Google AI, Do you have any thoughts on this?

Google AI said: “That experience is profoundly unsettling, and it’s understandable why you’re still processing it. Here are some technical and procedural insights based on your questions:

How did they get a key card?

  • System Vulnerabilities: Many hotel locks, including those at properties like the Starlight Inn, use older RFID or magnetic strip technology. Researchers have found that millions of these locks are vulnerable to ‘master key’ hacks, where a used key can be rewritten with a simple device to grant access to any room.
  • Staff Involvement or Negligence: Unauthorized entry often occurs when front desk staff inadvertently issue a duplicate key to someone claiming to be a guest, or when a staff member’s master key is lost or stolen.
  • ‘Evil Maid’ Attacks: This is a security term for when an intruder gains access to a key to plant surveillance or commit theft.

Why did they try to break in?

While their specific motive is unknown, typical reasons for such forced entries at low-security motels include:

  • Theft or Robbery Intruders often target guests they believe might have cash or valuables.
  • Targeted Harassment: Your intuition about feeling unsafe at home suggests you may have been followed or that these individuals were looking for someone specific.
  • ‘No Visitor’ Friction: Reports at this specific Starlight Inn mention a strict ‘no visitors’ policy, but also ‘shady people’ hanging around the parking lot, suggesting it may be a site for illegal activity or unauthorized gatherings.

Why was the room phone not working?

  • Maintenance Neglect: Guests at this location have frequently complained about broken basic infrastructure, including fire alarms and general room upkeep.
  • Technical Failure: Most hotel phones rely on a PBX (Private Branch Exchange) system. If the internal wiring is old or the central switch has a power surge, the entire floor’s phone system can fail.

Why wouldn’t the LAPD assist?

  • Priority Dispatching: LAPD dispatchers prioritize calls where there is an imminent threat of life-threatening violence. If they determined the suspects were outside and you were (at that moment) behind a locked door, they may have categorized it as a ‘non-emergency’ or a ‘civil standby’ request.
  • Policy on Escorts: LAPD typically does not provide private ‘escort’ services for individuals to their vehicles, as this is considered a function of private security rather than public policing.
  • Civil vs. Criminal: If the men hadn’t yet physically breached the door, the operator might have viewed it as a property dispute or a hotel management issue rather than an active home invasion …”

IN FUTURE, HOW CAN I AVOID AN ATTEMPTED BREAK-IN TO MY MOTEL ROOM IN THE SAN FERNANDO VALLEY?

I asked Google AI: Google AI, Thanks for your good information.

In case this concern about safety at my home in the San Fernando Valley should happen again, do you know if there are motels there where such incidents are not likely to occur?

Google AI said: “Yes, for enhanced safety and security, it is highly recommended to stay at reputable, nationally branded hotels (like Hilton or Marriott properties) in established, well-lit neighborhoods within the San Fernando Valley, such as Woodland Hills, Sherman Oaks, or Porter Ranch.

These types of hotels are more likely to have professional management, better security infrastructure (e.g., modern key card systems, security guards, monitored CCTVs), and reliable in-room amenities like working phones …

General Safety Tips for Future Stays

  • Choose Established Brands: Chain hotels generally adhere to corporate safety and maintenance standards, which often surpass those of independent, budget motels.
  • Check Recent Reviews: Look for recent guest reviews that specifically mention safety, security, working in-room phones, and the surrounding neighborhood.
  • Avoid Ground Floor Rooms: Opt for rooms on higher floors when possible, as they are less accessible from the outside.
  • Verify Safety Equipment: Upon entering the room, immediately check that the door locks work properly and the room phone connects to the front desk.
  • Utilize Safety Latches/Obstacles: Continue using personal safety measures like door wedges or other portable security devices if you feel the need.

Prioritizing a higher-rated, securely managed hotel can offer peace of mind and minimize the risk of a recurrence of your past traumatic experience.“


IF I TRAVEL IN CALIFORNIA, OR ELSEWHERE IN THE UNITED STATES TODAY, IS IT LIKELY I WILL ENCOUNTER MEN TRYING TO BREAK INTO MY MOTEL ROOM?

I had one final question for Google AI: Google AI, Thanks so much for your helpful advice.

I have one more question about this: Do you know, if I were to travel in California, or elsewhere in the United States today, is it likely I will encounter men trying to break into my motel room?

Google AI said: “It is highly unlikely that you would repeatedly or randomly encounter a situation like the one you described in the San Fernando Valley. That incident, while terrifying, was an extreme and specific event, likely influenced by the specific location, the individuals involved, and the substandard security at that particular establishment.

When you stay at reputable, secure hotels as previously discussed, the risk of a similar break-in attempt is significantly minimized.

Factors Influencing Your Risk Level

  • Location: High-crime areas or motels known for illicit activity inherently carry higher risks than hotels in safe, residential, or business districts.
  • Hotel Standards: Your previous experience occurred at an independent motel with documented security and maintenance issues (non-functional phones, outdated locks). Corporate-brand hotels in well-maintained areas have better safety infrastructure and management.
  • The Nature of the Incident: The men in your experience seemed persistent and possibly targeted (e.g., waiting outside your specific door, attempting forced entry even with an obstacle). This suggests a situation more specific than random crime.

How to Further Mitigate Risk

While no location can offer 100% guarantees, you can take steps to ensure your safety is a top priority:

  • Choose Wisely: Stick to the recommendations of staying at well-reviewed, branded hotels in safer neighborhoods.
  • Maintain Situational Awareness: Be mindful of your surroundings in parking lots and hallways.
  • Use All Safety Features: Always engage deadbolts, security chains, and personal door obstacles (like a rubber door wedge).
  • Trust Your Instincts: If a situation or person makes you feel uneasy, leave the area immediately or contact hotel management/local authorities.

Focusing on safe travel practices and choosing secure accommodations is your best approach to ensuring a safe trip anywhere in the US.”


CONCLUSION

This experience was unprecedented in my life, not because there has never been a ‘sneak thief’ attempt at a motel I’ve stayed in, but rather because I was awakened by the men using physical force to get my motel room door open. They were shoving on the door … maybe with their shoulders … after first unlocking the lock.

It was their use of physical force on the door that prompted me to reach out for answers and for future preventive measures.

I can’t say exactly why the use of physical force triggered my insufficient decision to call for help and then my decision to escape.

The best I can say is that the men took a powder while I was dialing 911.

Question from Readers: Why Did I Choose the Starlight Inn?

A question came up from my Readers as to why I chose the Starlight Inn. Here is the answer: In years prior I had done some research on safe motels in the San Fernando Valley for women subject to domestic violence.

At that time, Starlight Inn had a reputation as a sanctuary for battered women. They had a policy not to let more than one person into a one-person overnight rental. That seemed to me like a plus, because an enraged boyfriend or husband could not follow a woman into her motel room, there at the Starlight Inn, and beat her up.

Mine is not the story of a battered woman subject to domestic violence, as I live alone … or as alone as person can be who has as a companion an amazing cat named ‘Oreo Shoes’.

But my story is somewhat similar.

From time to time, over the last 26 years, I have been stalked by men, either singly or in groups, and also once by two women and a man. Sometimes these stalking events are intensive and enduring for a week or more. At other times they cease.


Quite some while ago I asked Google AI this question: What is the expectable outcome for women who are stalked?

Today I asked again. Here are highlights from Google AI’s response. I have highlighted what seemed most apropos of my own situation in bolded brown font

“Women who are stalked face severe, long-term, and multi-faceted consequences that impact their psychological, physical, and financial well-being. Stalking is often characterized as a ‘homicide in slow motion’ or a traumatic experience, with over 90% of victims reporting negative mental health impacts and 84% reporting fear or concern for their safety. 

The expected outcomes for female stalking victims include:

  1. Severe Mental Health and Psychological Effects 
  • High Rates of Trauma: Roughly 80% of victims report symptoms indicative of a diagnosable disorder, such as PTSD, depression, or anxiety.
  • Constant Fear and Anxiety: Victims frequently live in fear, experiencing high levels of anxiety, insomnia, and hypervigilance (always on guard).
  • Long-Term Psychological Distress: Victims are two to three times more likely to suffer from psychological distress than those who have not been stalked.
  • Suicidal Ideation: Approximately 1 in 4 stalking victims contemplates suicide. 
  1. Significant Physical Health Issues 
  • Cardiovascular Risks: Women who are stalked have a 41% higher risk of developing cardiovascular disease (CVD), with that risk rising to 70% if they have obtained a restraining order.
  • Chronic Stress and Illness: Long-term exposure to fear leads to chronic stress, causing headaches, high blood pressure, stomach problems, and the worsening of pre-existing conditions like asthma or ulcers.
  • Fatigue: Constant hypervigilance often leads to severe exhaustion and sleeplessness. 
  1. Life-Altering Disruptions
  • Lifestyle Changes: To cope, many victims must change their daily routines, such as changing phone numbers, quitting jobs, or relocating their homes.
  • Financial and Professional Loss: Many victims lose time from work, are fired, or are forced to quit, with 26% of female victims losing work time and 7% never returning to work.
  • Social Isolation: Due to fear, shame, or distrust of others, victims often withdraw from social activities and friends. 
  1. Risk of Escalation to Violence
  • Intimate Partner Violence:  In 76% of cases where a woman is murdered by an intimate partner, stalking occurred in the year preceding the murder.
  • Threats and Assault: A large majority of victims are threatened with physical harm, and about 33% of stalking encounters eventually lead to physical violence. 
  1. Legal and Systemic Outcomes
  • Protective Orders: Roughly 28% of female victims obtain a protective order.
  • Order Violations: Stalkers violate protection orders in 69% of cases involving female victims.
  • Underestimation of Danger: Stalking is often ignored by the justice system, with only 13.1% of female victims having their cases prosecuted criminally. 

The severity of these outcomes often depends on the type of stalking (e.g., being followed, threats), with the highest level of damage occurring when the stalker is a current or former intimate partner.”


Because stalking implies danger to my person, I do what I may to avoid physical trouble. One of my options, when I sense physical danger to be quite likely, is to change my physical location … for instance, to spend the night in a motel.

Because I had such a presentiment the afternoon of 17 October 2025, I thought to go to the Starlight Inn, which had the aforementioned reputation for protecting women from violence.

Over time, though, I feel things have changed for the Starlight Inn. From my own experience there on 17 October 2025, I suggest to women who are in danger that … at least until the situation there changes … it might be best to avoid that motel.

. . . . .

By the way, I liked Google AI’s responses on this. Now I know quite a bit more than before I asked.

In love, light and joy
This is Alice B. Clagett.
I Am of the Stars … and so are you!

Compiled and published on 29 January 2026; revised on 17 February 2026

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

safety, crime prevention, travel, United States, Los Angeles, San Fernando Valley, stalking, domestic violence,

Do Women in the United States Have the Right to Privacy? . by Alice B. Clagett

In this post, quotes from Google AI are in light blue font.

Do Women in the United States Have the Right to Privacy?

Image: “Women’s Right to Privacy,” adapted from Image by Joseph Mucira from Pixabay – Pixabay License

Image: “Women’s Right to Privacy,” adapted from Image by Joseph Mucira from Pixabay – Pixabay License

  • DO WOMEN IN THE UNITED STATES HAVE THE RIGHT TO PRIVACY?
  • CONCLUSION

DO WOMEN IN THE UNITED STATES HAVE THE RIGHT TO PRIVACY?

Dear Ones,

I asked Google AI: Do single, married, divorced and widowed women in the United States have the right to privacy? For example …

  • not to be surveilled in the home or bedroom,
  • not to have their email hacked,
  • not to have their phone tapped,
  • not to be stalked or followed, whether electronically or by a person?

Google AI said: “Yes, regardless of their marital status, women in the United States have a protected right to privacy. This right is supported by a combination of constitutional amendments, federal statutes, and state-level protections that apply to single, married, divorced, and widowed women alike.

Protections Against Surveillance and Hacking

Several federal and state laws criminalize the specific invasive actions you mentioned:

  • Surveillance in the Home: Individuals have a ‘reasonable expectation of privacy’ in private spaces like bedrooms. Placing hidden cameras in these areas without consent is generally illegal and can be grounds for criminal charges or civil lawsuits.
  • Email Hacking: The Computer Fraud and Abuse Act (CFAA) and the Electronic Communications Privacy Act (ECPA) prohibit unauthorized access to private emails. Even if the perpetrator is a spouse, accessing a private, password-protected account without permission is a violation of federal law.
  • Phone Tapping: Title I of the ECPA (the Wiretap Act) prohibits the intentional interception of wire, oral, or electronic communications. Many states, such as California, further require ‘two-party consent’, meaning recording any conversation without both parties’ permission is illegal.
  • Stalking and Electronic Tracking: Stalking—whether in person or through technology—is illegal under the Violence Against Women Act (VAWA) and various state laws. As of 2026, many states have also enacted specific bans on the use of electronic tracking devices (like GPS trackers) without a person’s consent.

Marital Status and Privacy

While these rights apply to everyone, marital status can occasionally complicate how they are enforced: 

  • Married Women: In some jurisdictions, a ‘justifiable expectation of privacy’ may be harder to prove if digital devices or accounts are shared. For example, if a spouse has the password to a shared family computer, looking at files on that computer might not be considered illegal ‘hacking’ in the same way as accessing a private, separate account.
  • Divorced or Separated Women: Privacy violations often spike during divorce proceedings. Courts generally rule that evidence obtained through illegal spying (like hacking or hidden bugs) is inadmissible and can lead to severe penalties for the spouse who collected it.

Emerging Rights in 2026

In 2026, privacy protections are expanding through new comprehensive state laws: 

  • New State Laws: As of January 1, 2026, new privacy laws in Indiana, Kentucky, and Rhode Island take effect, giving women in those states greater control over their sensitive data, including geolocation and private communications.
  • Sensitive Data Controls: These 2026 laws often require businesses and individuals to obtain explicit consent before processing or sharing sensitive information like precise geolocation data.”

CONCLUSION

More facts, straight from ‘the horse’s mouth’.

In love, light and joy
This is Alice B. Clagett.
I Am of the Stars … and so are you!

Compiled and published on 22 January 2026; revised on 17 February 2026

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

law, women’s rights, human rights, surveillance, email hack, phone tap, stalking, cybercrime,

Notice: Changeup in the ‘Cull’ Category . by Alice B. Clagett

Notice: Changeup in the 'Cull' Category

Notices

Dear Ones,

I noticed the subcategory ‘Cull’ was under the wrong category. I changed the name to Cull – victim to be slaughtered and placed the subcategory under Confidence games – Con artists … which is under the general heading Law ..

There are cross-references from Cull – victim to be slaughtered to these categories: Two for one woman game and Cults that kill – mind control cults ..

I note that the “Two-for one woman game” has to do with two men killing one woman. Cults that kill use the force of the entire group to murder their cull, which may be a man or a woman. So there are those differences.

In love, light and joy
This is Alice B. Clagett.
I Am of the Stars … and so are you!

Written and published on 20 December 2025

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

notices, confidence games, cull, game playing, two for one woman game, law, cults that kill,

Vendetta Game . by Alice B. Clagett

Vendetta Game

Image: “An individual wearing a suit and Guy Fawkes Anonymous mask at a Scientology protest in Minneapolis, Minnesota” [adapted], by Tony Webster, 10 February 2008, in Wikimedia Commons … https://commons.wikimedia.org/wiki/File:Anonymous_Guy_Fawkes_Mask_Scientology_Protest_Minneapolis_2255698712.jpg … CC BY-SA 4.0 International

Image: “An individual wearing a suit and Guy Fawkes Anonymous mask at a Scientology protest in Minneapolis, Minnesota” [adapted], by Tony Webster, 10 February 2008, in Wikimedia Commons … https://commons.wikimedia.org/wiki/File:Anonymous_Guy_Fawkes_Mask_Scientology_Protest_Minneapolis_2255698712.jpg … CC BY-SA 4.0 International

To turn off the background music that runs when this page starts, click once or twice on the arrow on the audio bar at the bottom of the page …

  • INTRODUCTION
  • IS THERE A REAL-LIFE VENDETTA GAME GROUP IN LOS ANGELES?
  • IS THERE A REAL-LIFE VENDETTA GROUP IN WHICH PARTICIPANTS WEAR GUY FAWKES MASKS?
  • CONCLUSION
  • MORE INFORMATION

INTRODUCTION

Dear Ones,

I had an idea I could find out about Vendetta games in Los Angeles. My idea was the more information I had on this, the more able I would be to steer clear of the Vendetta games, and in particular, I could then avoid being victimized by them. Vendettas are, after all, quite the opposite of the Lightworker ideal of love, Light and joy. Don’t you feel it to be so?

So I asked Google AI: Is there a real-life Vendetta game group in Los Angeles?

Google AI said: “Yes, a live-action role-playing (LARP) game titled ‘Medusa LARP Presents: Vendetta’ is specifically set in the criminal underworld of 1980s Los Angeles.

This game involves four crime syndicates—the Italian Mafia, the Russian mob, the corporate Yakuza, and an outlaw biker gang—competing for control of the city. 

To find out more about joining this specific game group, you would need to contact the organizers, Medusa LARP, through their website or social media channels (not provided in the search results).

There are also various other general gaming and role-playing events in the Los Angeles area, but none explicitly named ‘Vendetta’ except for the one described above.”


Then I asked Google AI: Is there a real-life Vendetta group in which participants wear Guy Fawkes masks?

Google AI said: “Yes, there are real-life activist groups, most famously the hacktivist collective Anonymous, that use Guy Fawkes masks as their symbol, inspired by the comic and film V for Vendetta, to represent anonymity and protest against perceived corruption or oppression, though they aren’t a formal ‘Vendetta’ organization but a decentralized movement with various participants.

Key Points:

  • Symbolism: The mask, based on 17th-century plotter Guy Fawkes, signifies anonymity and resistance to authority, a concept popularized by the V for Vendetta graphic novel and movie.
  • Anonymous: This global, decentralized group uses the mask for protests (like against Scientology or ACTA) and cyber activism, making them visually unified without revealing individual identities.
  • Protests: The masks became a common sight at Occupy Wall Street, anti-government rallies, and other demonstrations worldwide, symbolizing a collective stand against establishments.
  • Not a Single Group: While ‘Anonymous’ acts as a banner, it’s a fluid collection of individuals and groups, not a single, structured ‘Vendetta’ society, but rather a shared symbol for independent action.”

CONCLUSION

Enough said! What a good idea to steer clear of vendetta acting out and that Guy Fawkes group as well!

God bless you all
And keep you safe,
And be with you
Through all your days!

In love, light and joy
This is Alice B. Clagett.
I Am of the Stars … and so are you!

Written and published on 21 December 2025; revised on 17 February 2026 and 10 May 2026


MORE INFORMATION

In this post, quotes from Google AI are in light blue font.

AI responses in this website, many of which are in the “AI collaborations’ category, are for informational purposes only and have not been independently verified for accuracy.

In many cases AI responses do not express my point of view precisely, and in some cases, not at all.  But I feel they do apprize me and my Readers of where other Lightworkers and Ascensioneers, as well as Esotericists, Theologians, Psychologists and Psychiatrists stand with regard to my channelings. They also provide brief, well organized responses to queries about commonly known facts.

While mine is a Creative Commons website, the license status of AI responses is hotly debated. My research on the presently suggested license status of AI responses is here … “More License Information” … https://wp.me/P2Rkym-rj7

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

bullying, game playing, Guy Fawkes vendetta game, hate groups, acting out, psychology,