Tag Archives: cyber crime

Call to Action: Cybercrime Alert: Geotracking and Home Burglaries . by Alice B. Clagett

Published on 15 February 2019

Dear Ones,

This is a Call to Action: I ask that the danger of criminal snooping on individuals’ geotracking, in its many iterations, whether …

  • through online mapping services, online hotel reservations, or online near instantaneous credit card transaction postings;
  • through electronics in modern cars; or
  • through GPS implants in transportable modern electronics

… to the end of home burglary while people are travelling, or with a view to threat to life and limb while travelling … be evaluated, and the results presented to the public.

I note what seems to loom as a critical danger of identity theft and potential location tracking in Microsoft’s centralization of customer identity and habit information, and ask that this danger by evaluated by cybercrime analysts. If there is a danger, what is its urgency; and how may it be mitigated?

In love, light and joy,
I Am of the Stars
…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
…………………………………………………….
…………………………………………………….

call to action, calls to action, geotracking, GPS, burglary, burglaries, law enforcement, cyber crime, cybercrime, identity theft, Microsoft,

Call to Action: Calculate Cybercrime Drag on U.S. Economy . by Alice B. Clagett

Written and published on 15 February 2019

Dear Ones,

This is a Call to Action: I ask that economists calculate the current cyber crime drag on the United States economy.

Also that they calculate the tipping point at which an internet presence for banks, stock brokerages, and online stores will become no longer economically feasible.

Has the tipping point already been reached? If not, can the date be extrapolated, and may financial institutions and online merchants be informed of this date, so that the move of financial matters away from the internet may be accomplished in an orderly way?

Telephone and fax offer alternatives to conversations currently taking place online. I gather that phone service may also have been cyber criminalized, and request research into resolving telephone privacy as well as cyber secure faxing, If these cannot be attained, then I suggest advising telephone service customers of this, so that an orderly move can be made back to paper correspondence and to the United States mail.

I note, for instance, the need that will arise for goods catalogs, such as the old Sears catalog, to replace Internet giants such as Amazon.com, and the need that will arise for greater stocks of inventory in local community stores.

I note the coming need of greater personnel in the United States Postal Service, to provide service for transactions formerly posted online.

I note the coming need for more paper production (hence more timber planting) to replace paperless online transactions.

In love, light and joy,
I Am of the Stars
…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
…………………………………………………….
…………………………………………………….

economics, economy, calls to action, call to action, cyber crime, cybercrime, timber industry, store inventories, United States Postal Service, phone service, telephone service, fax service. industry, banks, financial institutions, stock brokerages, online marketing, communications, telecommunications, internet, finance, timber industry, paper industry, online retail, housed retail, banks, stock brokerages,

Amateur Sleuth: On Matching Up Mugshots . by Alice B. Clagett

Written and published on 29 April 2018; updated on 22 August 2020 and 24 August 2020; revised
The images of criminals shown below are, as I understand it, all right to put online because they are intended to help in crime prevention.

  • MY ‘CRIMINOLOGY’ BACKGROUND: CO-AUTHOR OF A CRIME AVOIDANCE ‘HOW TO’ BOOK SOME YEARS AGO
  • THOUGHTS FROM AN AMATEUR SLEUTH
  • MUGSHOTS: MATCHING HEAD SIZE AND THEN ANALYZING EACH FACIAL FEATURE
  • MUGSHOTS: TAKING AGE DIFFERENCES INTO CONSIDERATION
  • MUGSHOTS: DIFFERENCES CAUSED BY HEAD TILT
  • MUGSHOTS: WIDTH OR FULLNESS OF THE FACE DUE TO WEIGHT GAIN, STEROIDS, BOTOX, OR ADDICTIONS
  • ON CROOKS WHO IMPERSONATE THE SECRET SERVICE
  • ‘CRIME CLUSTERS’ ON BACKGROUND ALERT: CRIMINAL OBFUSCATION OR CYBERCRIME?
  • MORE INFORMATION

Dear Ones,

MY ‘CRIMINOLOGY’ BACKGROUND: CO-AUTHOR OF A CRIME AVOIDANCE ‘HOW TO’ BOOK SOME YEARS AGO

As you may know, some long years ago, using the pen name Cricket Clagett, I co-authored a book, now out of print, entitled “1001 Ways to Avoid Getting Mugged, Murdered, Robbed, Raped, and Ripped Off” …

Citation: “1001 Ways to Avoid Getting Mugged, Murdered, Robbed, Raped, or Ripped Off,” by Vivo Bennett and Alice Clagett, published by Mason / Charter, New York 1977

It looks like there is a reprint being ‘ripped off’ now … go figure! ..

THOUGHTS FROM AN AMATEUR SLEUTH

Since then, I have had a casual, ‘amateur sleuth’ interest in criminology. Lately, I have been interested in ‘crime makeovers’. (You can search that phrase on my blog for what I have come up with.)

From time to time, I will see two mugshots (facial photos), and ask my family and friends: Do you think these are the same person? I have noticed they say: No! They’re two different people.

I find this interesting, and I wonder why they arrive at these conclusions. For myself, when I analyze two mugshots, I notice that I also make snap judgments, such as …

Gosh, do these two people look different!

Then I think: Well, but they somehow feel like the same person. This is the intuitive in me speaking I guess. I get what they call, in the detective novels, a ‘hunch’ (as opposed to a ‘lead’ … which I figure must be more substantial).

I know there are all kinds of ways to alter facial features and body statistics so as to avoid detection by camera at a crime scene, and also to avoid criminal database matchups. I have put a little about this in another blog,…

Link: “Crime Makeovers 1,” by Alice B. Clagett, published on 5 April 2017; revised on 17 April 2017 and 15 April 2018 … https://wp.me/p2Rkym-76J ..

MUGSHOTS: MATCHING HEAD SIZE AND THEN ANALYZING EACH FACIAL FEATURE

So then, I came up with the notion of sizing the bottom of the chin and the top of the head (as opposed to the top of the hair) on each mugshot the same … and then going facial feature by facial feature. For instance, I might first observe the nose, then the eyes, then the eyebrows, then the pattern of the facial hair, then the ears, and so on. And then I might make a tally of likely matched features. And then I would decide the likelihood of a match (even though date of birth, weight, social security number, and even height might vary).

Using this method, I considered these people likely to be the same person …

Image: “Jeffards Roy Byington 1,” in Homefacts … https://apps.colorado.gov/apps/dps/sor/search/search-detail.jsf?id=XX15017761 … COMMENTS: Offenses: Out of State Nebraska: 2nd Degree Sexual Assault; Out of State Iowa: Lascivious Acts with a Child; Out of State Oregon: 1st Degree Burglary; Out of State Nebraska: 2nd Degree Sexual Assault. Address: 322 Hummingbird, Pagosa Springs, [Colorado] 81147; Date Reported: 5 November 2013.

Image: “Jeffards Roy Byington 1,” in Homefacts … https://apps.colorado.gov/apps/dps/sor/search/search-detail.jsf?id=XX15017761 … COMMENTS: Offenses: Out of State Nebraska: 2nd Degree Sexual Assault; Out of State Iowa: Lascivious Acts with a Child; Out of State Oregon: 1st Degree Burglary; Out of State Nebraska: 2nd Degree Sexual Assault. Address: 322 Hummingbird, Pagosa Springs, [Colorado] 81147; Date Reported: 5 November 2013.

Image: “Michael Doane Keslar,” in Colorado Bureau of Investigation … https://apps.colorado.gov/apps/dps/sor/search/search-detail.jsf?id=X002451280 … COMMENTS: Multiple Offender. 18-3-403: 2nd Degree Sexual Assault; 18-6-301: Incest. Address: 1642 Pinyon Ct, Loveland, [Colorado] 80538.

Image: “Michael Doane Keslar,” in Colorado Bureau of Investigation … https://apps.colorado.gov/apps/dps/sor/search/search-detail.jsf?id=X002451280 … COMMENTS: Multiple Offender. 18-3-403: 2nd Degree Sexual Assault; 18-6-301: Incest. Address: 1642 Pinyon Ct, Loveland, [Colorado] 80538.

Image: “David Stuart James,” in Colorado Bureau of Investigation … https://apps.colorado.gov/apps/dps/sor/search/search-detail.jsf?id=X002451290&ext=t … COMMENTS: Multiple Offender. Out of State Pennsylvania: Murder. 18-6-403 (Pornography Involving a Child): Sexual Exploitation of a Child. Address: 000 Unknown, Glendale, [Colorado] 80246.

Image: “David Stuart James,” in Colorado Bureau of Investigation … https://apps.colorado.gov/apps/dps/sor/search/search-detail.jsf?id=X002451290&ext=t … COMMENTS: Multiple Offender. Out of State Pennsylvania: Murder. 18-6-403 (Pornography Involving a Child): Sexual Exploitation of a Child. Address: 000 Unknown, Glendale, [Colorado] 80246.

I note in the last mugshot, the higher hairline made matchup more challenging. The determining factor, for me, with these mugshots, was the disparity in the shape of the two eyes.

MUGSHOTS: TAKING AGE DIFFERENCES INTO CONSIDERATION

Age can also make it challenging to match mugshots. For instance, here are a young and an older mugshot of Jeffards Roy Byington. The age disparity does make these mugshots look different, but, I feel, not too different …

Image: “Jeffards Roy Byington 1,” in Homefacts … https://apps.colorado.gov/apps/dps/sor/search/search-detail.jsf?id=XX15017761 … COMMENTS: Offenses: Out of State Nebraska: 2nd Degree Sexual Assault; Out of State Iowa: Lascivious Acts with a Child; Out of State Oregon: 1st Degree Burglary; Out of State Nebraska: 2nd Degree Sexual Assault. Address: 322 Hummingbird, Pagosa Springs, [Colorado] 81147; Date Reported: 5 November 2013.

Image: “Jeffards Roy Byington 1,” in Homefacts … https://apps.colorado.gov/apps/dps/sor/search/search-detail.jsf?id=XX15017761 … COMMENTS: Offenses: Out of State Nebraska: 2nd Degree Sexual Assault; Out of State Iowa: Lascivious Acts with a Child; Out of State Oregon: 1st Degree Burglary; Out of State Nebraska: 2nd Degree Sexual Assault. Address: 322 Hummingbird, Pagosa Springs, [Colorado] 81147; Date Reported: 5 November 2013.

Image: “Jeffards Roy Byington 2,” in Homefacts … https://www.homefacts.com/offender-detail/IDSX32735/Jeffards-Roy-Byington.html … COMMENTS: Offenses: Lascivious Acts with a Child Correlation Pending; Sexual Assault Charge Correlation Pending; Lascivious Acts with a Child Charge Correlation Pending; Sexual Assault Charge Correlation Pending. Last Known Address: 4100 N. Maple Grove Rd, Boise, Idaho 83704.

Image: “Jeffards Roy Byington 2,” in Homefacts … https://www.homefacts.com/offender-detail/IDSX32735/Jeffards-Roy-Byington.html … COMMENTS: Offenses: Lascivious Acts with a Child Correlation Pending; Sexual Assault Charge Correlation Pending; Lascivious Acts with a Child Charge Correlation Pending; Sexual Assault Charge Correlation Pending. Last Known Address: 4100 N. Maple Grove Rd, Boise, Idaho 83704.

MUGSHOTS: DIFFERENCES CAUSED BY HEAD TILT

I have also found that when a person looks slightly down or up, when a photo is taken, then the photos look very different, and a matchup becomes more challenging because of that. The middle vertical row of faces in these artistic sketches clearly illustrate the differences that head tilt causes …

Image: “Head Tilt and Dominance (IMAGE),” Association for Psychological Science … https://media.eurekalert.org/multimedia_prod/pub/web/203601_web.jpg ..

Some of the most notable of these are the length of the forehead, the nose, and the chin. The eyebrows, eyes, mouth, and ears also look very different, do you not think?

MUGSHOTS: WIDTH OR FULLNESS OF THE FACE DUE TO WEIGHT GAIN, STEROIDS, BOTOX, OR ADDICTIONS

I have also noticed that a change in width or fullness of the face can make it look very different.

ON CROOKS WHO IMPERSONATE THE SECRET SERVICE

This section opens up a can of worms, I feel, to do with criminals putting fake criminal information online so as to ‘diss’ or ‘take down’ each other.

You know, criminals are always on the lookout to make themselves appear to be imminently respectable; they are very into ‘false authority’. It would be very like a criminal gang to pretend to be the FBI, and to issue a false FBI or CIA badge, which for all I know may even be purchasable online, to their most rogue operators.

For instance, compare this real FBI badge …

Image: “The badge of the Federal Bureau of Investigation (FBI),” in English Wikipedia, 1 May 2013 … https://en.wikipedia.org/wiki/Symbols_of_the_Federal_Bureau_of_Investigation#/media/File:Badge_of_a_Federal_Bureau_of_Investigation_special_agent.png … public domain

Image: “The badge of the Federal Bureau of Investigation (FBI),” in English Wikipedia, 1 May 2013 …
https://en.wikipedia.org/wiki/Symbols_of_the_Federal_Bureau_of_Investigation#/media/File:Badge_of_a_Federal_Bureau_of_Investigation_special_agent.png … public domain

… with this fake badge available online for about $50 …

Image: “US FBI Special Agent Badge Solid Copper Replica Movie Props,” at Coin Souvenir … https://cdn.shopify.com/s/files/1/0011/9527/8380/products/20190904_162727_140_1024x1024@2x.jpg?v=1581056062 ..

To me the movie prop looks quite like the real McCoy; what do you think about it?

I feel that law enforcement everywhere must be on the lookout for these sorts of hijinks and shenanigans by crime gang members. WikiHow has valuable information on how to know if someone purporting to be a secret service agent really is one. The long and the short of it is, one never knows these days about credentials.

I recall several years ago two men came to my street and broke into the Chatsworth Nature Preserve next door. When I accosted them, the driver of the vehicle said he was a law enforcement ‘detective’, and that he had gotten the ‘go ahead’ from the man in charge of my local LAPD station.

I knew that it was a woman who was in charge of my local LAPD station, so I knew he was lying. And in addition, when he showed me his badge, I could see it was a fake badge, not the LAPD police badge or any variant thereof.

As I recall, when I looked into it, I found that these fake law enforcement badges were a dime a dozen. People are apparently always coming up with these fake IDs.

It is a hard one, though: When I saw the badge the one burglar had, I figured the man might have a gun too, just as true-to-life detectives do. So I figured it was best to just let them make their escape … which they did. They just drove away, and got off scot-free.

That goes to show the power of false authority; the power that criminals know and love, and use with great aplomb against unsuspecting law-abiding people such as those of you reading my blog.

‘CRIME CLUSTERS’ ON BACKGROUND ALERT: CRIMINAL OBFUSCATION OR CYBERCRIME?

As a casual user of internet background search services, I sometimes run across what might be termed ‘crime clusters’ by first and last name (with variant middle names) This makes me wonder if the middle names and other police report statistics might have been misrepresented in some way, possibly by the suspects, or maybe through cybercrime?

CONCLUSION

Well, dear reader, it is up to you to figure out these sorts of puzzles. And puzzles they are! For there is nothing that an outlaw likes to do more, than to elude a posse! I wish you the best of luck in your own amateur sleuth endeavors!

In love, light and joy,
I Am of the Stars

…………………………………..
MORE INFORMATION

Link: “Alice’s Perilous Tales: Murder in the Wild West,” by Alice B. Clagett, written and published on 8 August 2020 … https://wp.me/p2Rkym-jse … COMMENT: If this blog is marked private, then it is not for public viewing.

Video: “Merle Haggard, Willie Nelson – Pancho and Lefty (Video),” by Merle Haggard, 64 January 2015 … https://www.youtube.com/watch?v=UoKvUYbGu7A ..

…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
…………………………………………………….
…………………………………………………….

crime makeover, mug shots, crime databases, crime clusters, Background Alert, FBI wanted list, law enforcement, Wild West, Pancho and Lefty, outlaws, gunslingers, false authority, FBI, secret service, CIA, drug running, cyber crime, crime and crime prevention, confidence games, Wifer-Hacker,

The Karma of Hacking . plus House Break-ins; Communications and Transportation and Crime . by Alice B. Clagett

Written and published on 29 July 2017; revised

  • THE KARMA OF HACKING
  • ON THE WILDING OF SECRET SERVICE CYBER SPYWARE
  • THE ‘ONCE REMOVED’ QUALITY OF HOUSE BREAK-INS AND BURGLARIES: ASTRAL STORIES
  • COMMUNICATIONS / TRANSPORTATION AND CRIME: PHONE, INTERNET, AND POST OFFICE
    • Hacking Personal Computers through Phone Lines
    • Astral Rumor: Facebook Hacking and Cloning
    • Has the Drug Industry Gone Postal?
    • Private Helicopter Pads and Drug Transport
    • State Check Points on Interstate Freeways
    • Mass Media, Drugs, and Violence
  • TRACKING OF PERSONAL CARS AND PERSONAL TRAVELS
    • Location Detection of Personal Automobile through ‘Backdoor’ Factory-Installed Software?
    • Smartphone, Cell Phone, and Facebook Location Detection Software
    • The New Clairs and Clearing of Criminal Tendencies from the Astral Body
      • Location Detection Backdoor Software Claims
      • Spy Camera Claims and Their Easy Resolution
  • ON EVALUATING AND ACTING ON ASTRAL STORIES

Dear Ones,

THE KARMA OF HACKING

Times are tough, and many honest people, worldwide, are turning to cyber crime as a way to make ends meet, and to support their families …

It seems that cyber attacks, as with house break-ins, are sourced from our wider circle of friends and acquaintances, including social friends and those we patronize for business.

From my research, I was surprised to find recently, that even long-time friends and acquaintances of folks’ families are not immune from preying on their good friends and relatives, or relatives by marriage, on the pretext that their victims will never know that they are being attacked.

If you and your family are very computer savvy, I beg you to consider the karma of hacking; the karmic results that will manifest in your lives, should you opt to hack.

Consider, for instance …

  • The loss of long-time friendships,
  • The lack of goodwill from the friends and neighbors that might be victims,
  • And the catastrophic results to a family’s legal computer and internet enterprises.

As I understand it, the penalties for hacking and ID theft might be in the range of …

  • $3000 per instance and/or up to 20 years in jail.

How would it be for a family, if one member got a prison sentence? If the penalty were to be financial, how would that affect the family savings account?

Children learn how to interact with the world at their parents’ knee, and by watching what their parents do. How would it be if our children learned to be cyber criminals so as to impress their parents? What future would our children have?

For instance, what if detection of hacking results in a felony conviction? There are restrictions on the liberties of felons, even after they have served time …

  • Felons cannot leave the country.
  • They cannot bear firearms.
  • They cannot serve on juries.

To me, these are very important liberties, the loss of which would be inconceivable. Yet every felon must face their loss.

For those of my readers who are computer savvy: Please take the above into consideration. If you see merit in it, please forward it to your computer savvy friends.

I wish the best for each of you in the coming times.

ON THE WILDING OF SECRET SERVICE CYBER SPYWARE

The astral airs have it that Secret Service cyber spyware worldwide has gone wild, through employees taking software home for personal use, such as to spy on spouses, relatives and friends.

Maybe their less-secure home computers are being hacked by cyber criminals for the software, who then use it for their nefarious undertakings.

Maybe disgruntled ex employees, fired for drug use, are aligning with the drug lords and selling the software as a stopgap till they find employment elsewhere.

Whatever the mode has been, if the astral airs are to be believed, some pretty potent secret service software has gone wild, and is now in the hands of crime families, drug lords, and the mobs and mafias around the world.

What can possibly be done to protect the average Joe and his family from the wiles of these career criminals?

THE ‘ONCE REMOVED’ QUALITY OF HOUSE BREAK-INS AND BURGLARIES: ASTRAL STORIES

With regard to tips to family and friends on house break-ins and burglaries, here are two examples from the clair plane …

  • A woman who has a storefront acupuncture business along with her husband, copies clients’ drivers licenses, which have their addresses on them, when she takes payments. She has an opium addiction, and passes the addresses on to a younger member of her extended family, who specializes in house break-ins. He pays her for the tips on the addresses, and this helps support her opium habit. Because she and her husband are well respected in the community, they are unlikely to fall under suspicion.
  • A young man works for a rental car company as the person who drives clients home after they return their rental cars. He reports to an extended family member on likely looking houses for break-ins. The tips he gives to his burglar family member are not intentional; he wants to keep his job. But both are psychic … as are most people in these days of global telepathy … and the driver cannot keep this information from his burglar friend. Further, because of family bonds, he cannot report the criminal or curtail his activities.

The difficulty here, as telepathy sweeps round the globe, is that people are continuing with crime as usual. Hoping they will get away with it a little longer, despite knowing that an ever-widening circle of acquaintances know what they are doing.

What will happen as these issues of crime amongst neighbors and extended family begin to settle out, is anyone’s guess. I am hoping for a quiet and peaceful transition, insofar as that is possible.

COMMUNICATIONS / TRANSPORTATION AND CRIME: PHONE, INTERNET, AND POST OFFICE

Hacking Personal Computers through Phone Lines

There is an astral rumor that there is a backdoor to people’s phone lines through the online customer service. The rumor goes that it is easy to hack the phone line online passwords, and so gain access to people’s phone messages, and hear or delete them.

There is another rumor that, when people opt for the cable service that combines internet with phone, on one line, crooks can call the phone line, using a randomized phone number, and hack their intended victim’s computers through the phone line back door.

If true, this would allow identity theft, as well as credit card fraud, and it would allow sensitive personal documents to be stolen.

Astral Rumor: Facebook Hacking and Cloning

There is an astral rumor that Facebook has a backdoor to do with cloning folks’ desktops and backing up their hard drives. To avoid this, rumor has it, one must sign off Facebook after each use, and also disable Facebook chat, which is casting up messages on personal computer desktops.

Has the Drug Industry Gone Postal?

The buzz in the astral airs has it that mafia in its various iterations worldwide does its best to place a ringer in post offices, and in the offices of private mail carriers, for nefarious reasons to which they alone are privy. One might hazard a guess that a goal might be postal shipment of drugs and other illegal items.

There is another astral story that crime families are attempting to cut deals with cable carriers to hardwire or software hack personal internets.

Private Helicopter Pads and Drug Transport

Could the astral rumors be true? Are private helicopter pads being used to transport drugs into urban areas? If so, would decriminalization of drugs help with regulation and taxation of the drug industry?

State Check Points on Interstate Freeways

Yet another astral rumor: Are male drug runners at State checkpoints on Interstate freeways disguising themselves as women so as to avoid the typecasting warning signs from popping up with the roadside checkup personnel?

Mass Media, Drugs, and Violence

There is an astral rumor that the themes of the mass media are being financed by mafias worldwide to drum up public support of criminal activities and to cause people to long to take drugs and engage in acts of violence.

Then, there is another astral rumor that the people involved in mass media creation … whether producers, writers, directors, or actors, I have not heard one way or the other … might be involved in drugs and violence and so on, and thus prone to create works of art based on their own experience of life.

Of course, it might also be that many people are already in that space, and longing to take drugs and engage in acts of violence; as I recall, this is closer to the theories proposed by mass media moguls: To wit, that the mass media are a backward looking indicator that creates on the basis of public tastes.

TRACKING OF PERSONAL CARS AND PERSONAL TRAVELS

Location Detection of Personal Automobile through ‘Backdoor’ Factory-Installed Software?

Another astral rumor that I heard in 2016, is to this effect: There is some software purportedly installed in modern, electronic cars, and typically turned on by consumers … could the rumors be referring to Bluetooth or Pandora, I wonder? … that allows crooks to trace the whereabouts of people on the road. The wild astral story had it that the creator of the software, whatever it was, and whoever he was, had relocated to … was it Japan? … and was living the good life there. Maybe this has to do with mapping software in the cars?

Smartphone, Cell Phone, and Facebook Location Detection Software

Then there is a well-breezed-about story, I guess true, to the effect that smartphones and Facebook have location software that, if not disabled, allows a person’s whereabouts to be discovered. I think everyone knows about that, though.

The New Clairs and Clearing of Criminal Tendencies from the Astral Body

Location Detection Backdoor Software Claims. Location detection backdoor software claims are hard to track down, since one of the new clair abilities is to place oneself in someone else’s shoes, and in that way one might figure out someone else’s location. The trouble here comes with insufficient clearing of criminal malware concomitant with the new clair ability manifesting. I expect the Incoming Light will soon provide a fix for that … maybe even during the August 2017 Lion’s Gate.

Spy Camera Claims and Their Easy Resolution. The same is true of astral claims that there are ‘spy cameras’ in personal residences. What this apparently really is, is the new clair ability to ‘put yourself in someone else’s shoes’, combined with as yet uncleared voyeuristic tendencies (peeping tom propensities, for instance) or with the desire to frighten another person, so as to feel less afraid oneself during times of high Light.

So this last item is, in most instances, merely an annoyance. If you have any doubt about it, you can purchase an inexpensive wireless camera RF detector … see https://www.harborfreight.com/wireless-camera-rf-detector-95053.html … from stores such as Harbour Freight, and settle the issue definitively for the sake of the inner child within.

ON EVALUATING AND ACTING ON ASTRAL STORIES

If real life were half as scary as the astral stories, we would all be living in hell, rather than here on Earth. I guess the main thing about the astral stories is: We can take them with a grain of salt, unless evidence pops up that supports them.

Even then, when we have possible evidence in hand, the thing to do is to investigate, on the physical plane. Look folks in the eye … Ask questions.

In most cases, I find that what is actually taking place is a merging of our hellworld scenarios … the landscapes of our unconscious and subconscious fears, angers, and negative touch-points, with the brighter landscape of the conscious mind.

In Timeline terminology, we call this merging denser timelines with the brighter timelines made available to us through the Incoming Light.

What it takes to do the merge is a neutral state of mind. Keep the chest muscles relaxed. Then, as we undergo dharmic action … ‘right action’ … in the physical world, we can transform and merge the negative timelines with the New through the process of Personal Alchemy.

In love, light and joy,
I Am of the Stars

…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

…………………………………………………….
…………………………………………………….

cyber crime, crime, hacking, identity theft, law enforcement, burglary, house break-ins, worldwide telepathy, personal alchemy, mafia, dharma, acting out, right action, transformation, timeline merge, astral stories, timelines, crime families, crime prevention, electronic devices, disclosure,