Tag Archives: Cybercrime

Con Games: The Slide . by Alice B. Clagett

Written and published on 11 January 2021

Dear Ones,

Here is a chilling confidence game to look out for. I call it ‘the Slide’ …

The Slide occurs when a confidence man or woman is able to move money or stocks or bonds or other financial instruments from your own financial institution to their own account, without your authorization.

Cybercrime is so prevalent online these days that, I feel, the FBI cannot hope to keep up with our online reports to them of cybercrime perpetrated against us. Although most cybercrime likely is done by adults, it seems to me possible that even a young person might engage in hacker/cloner activities so as to achieve ‘the Slide’ these days, to help with family finances during the pandemic.

The possibility that ‘the Slide’ might occur is greater these days because of the ease with which transfers of money from one institution to another can be authorized online. Within a few days, through online transfer, a person’s savings might be transferred to another account.

How might ‘the Slide’ occur? Here is one scenario: A hacker/cloner might find out your username and password for your bank or brokerage , for instance. Then they would be able to get into your bank account online.

They might set up another bank or brokerage account with the same institution. Then the confidence man might log into your bank account and initiate a transfer of all or part of your assets to the partnership, corporation, or trusteeship.

How could the confidence man or woman ‘take in’ your bank or financial institution in this way? Here are three possible ways I thought up:

The first is for the confidence person to create a false ID for themselves, using your name and social security number. I looked it up; I think the FBI calls this ‘identity theft’. In other words, the con man assumes your name with the intent to commit fraud.

In this first scenario, the false ID is set up, and the identity theft bank or brokerage account. Then the crook gets into your account online and initiates the transfer. When the assets arrive at his fake account, he withdraws them.

I figure there might be a second scenario in which the con artist transfers your individually owned assets to a new bank or brokerage account he has set up. This new account is not that of an individual, but that of a different entity. The entity might be a partnership, a trust, a company, a corporation, or a nonprofit institution the con artist sets up, pretending that you (his intended ‘mark’) are a principal in the business … a partner in the partnership, a trustee of the trust, an owner or officer in the company, or an officer or member of the board of the corporation or non-profit, for instance.

Thus it might make sense to your bank or brokerage to let your assets be transferred to this other entity … not an individual entity, like yourself, but an entity in which they believe you play a role and to which you might be assumed to be contributing an ownership share, thus increasing your assets held in this other entity.

So lets say that … taken in by the confidence man … your bank or brokerage approves the transfer of your assets to the non-individual entity created by the crook. Then when your assets arrive at the ‘paper entity’, the con artist makes off with your assets.

There is a third scenario I can think of, that hits home pretty hard because of its cleverness and deviousness. This scenario involves your account, another financial account you used to have online, and which is now closed, and a ‘paper entity’ account as described above.

You may find that after you cancel out of an online financial account, it is impossible to truly get the account to go away from online. Two years later, you might take a look at the cancelled account, and find that by entering your username and password the account comes up again online, ready to have money transferred into it from your financial institution.

Thus you may have a cancelled account sleeping peacefully online, and to which you may not give a second thought. Yet by hacking/cloning your contacts in Cloud, the con man or woman finds out about the dormant financial account, and also finds out about your bank or brokerage account.

The con artist creates a ‘paper entity’ (as described above) at the same financial institution as that of your cancelled account.

The Slide that next occurs is a ‘Onesie-Twosie’ Slide which goes along like this: The con artist makes an online transfer of your assets from your bank or brokerage to your dormant online account number 2, and from there he slides the assets into his ‘paper entity’ at the same financial institution number 2. Then he ‘lifts’ the assets.

I have heard of even more devious con artist scenarios, in which the confidence person creates several ‘paper entities’, all with the same name and the same officers. For instance, there might be a non-profit and a corporation, both with the same name and officers. Or there might be a non-profit and five or six corporations, all with the same name and officers.

Let’s say the confidence person persuades you to donate a modest sum of money to the non-profit. Then he hacks into the bank or brokerage through which you transferred the money to the non-profit. Then he ‘lifts’ some or all of your assets to the non-profit. Then he moves the stolen assets successively through various corporations by the same name, till they are so deeply hidden they cannot be found by your aggrieved bank or its cybercrime sleuths.

With the money safely ensconced in his fifth ‘paper corporation’ he can spend it as he may. He might be in Tahiti a few days from now, sitting in a beach chair on a sandy beach, Mai Tai in his hand, laughing at you an your bank or brokerage! That would be a fine state of affairs, would it not?

What can be done about the state of cybercrime in the world today? How are you to keep your assets safe? My thought is, the more people know about the methods con artists use, the less the con artists will be successful in attempting them. So, I feel, it is good to ask your financial institutions to look out for ‘the Slide’, and to alert you if anyone tries to transfer money, stocks, or bonds out of your account.

It is good to remember that banks and brokerages only insure your savings up to a point, so if ‘the Slide’ does occur … despite your transaction alerts and despite your talks with your financial account managers … then you will only be reimbursed by the financial institution up to the amount of their insurance for what was ‘slid’ away from you.

As I recall, there are different insurance limits for different sorts of financial instruments, whether cash, stock, bonds, and so on. It might be a good idea to talk with your bank or brokerage about what the insurance limits are, and what to do if you are lucky enough to be ‘over the limit’. For instance, you could ask your money manager if moving part of your assets to another financial institute would result in your assets being wholly insured.

In love, light and joy,
I Am of the Stars

…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
…………………………………………………….
…………………………………………………….

law, law enforcement, con games, confidence games,

Cybercrime: Thumbprint Database Thefts? by Alice B. Clagett

Written and published on 8 October 2019

Dear Ones,

On the psychic plane I heard some awful cybercrime news: I heard that some of the sports club chain databases have been breached, and the thumbprints used to sign customers in for use of the facilities stolen by crime families.

Why would crime families do this? My guess is they could use the thumbprints to forge documents requiring thumbprints as verification of authenticity. One appalling purpose might be the production of fraudulent wills, such as those that have the thumbprint of the testator (the person whose will it is) instead of their signature …

Link: “Making Your Mark: Using a Fingerprint When a Testator Cannot Sign the Will,” by Jennifer F. Hillman, Esq., in Lexis Nexis: Estate and Elder Law … https://www.lexisnexis.com/legalnewsroom/estate-elder/b/estate-elder-blog/posts/making-your-mark-using-a-fingerprint-when-a-testator-cannot-sign-the-will ..

For example, if the mob kidnapped an elderly person who had signed up at a health club using signature identification, and if the mob had breached the health club’s signature database … say via what might be an ever-changing array of front desk personnel, cleaning staff, and exercise class instructors … then the person might be found dead … perhaps through a forced recreational drug overdose … and the caregiver (a mob person, or a person on the dole to the mob) might produce the fingerprinted fraudulent will, which he or she had witnessed. And the estate might go to the mob boss or his money laundering attorney(s).

Well, this is terrible psychic news, is it not? Of course, one must keep in mind that psychic intel might be a preview of an event that has not yet arrived, or might be a warning about an event that will not actually happen because people get wise to what might occur.

For those in the legal field, I guess the takeaway is that signature authentication of documents is no longer a slam dunk.

In the same way, body mark identification no longer proves that a person has an intimate relationship with another person, as body marks are easily discerned and recorded on handhelds at beaches and in sports club dressing rooms.

In love, light and joy,
I Am of the Stars

…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
…………………………………………………….
…………………………………………………….

law enforcement, crime, confidence games, crime families, cybercrime, law, astral stories, urban legends,

How Repeating Astral Phrases Speak to the Character of a Mind Controller . by Alice B. Clagett

Published on 28 July 2019; revised on 26 May 2020
Previously titled: Repeating Astral Phrases as a Feature of Our Commensal and Adventitious Microorganisms

  • REPEATING MALWARE PHRASES OR SAMSKARAS THAT I HEARD IN 2016
    • My life has no quality
    • You have no personality
    • You are one big ego
    • Astral stories about people stealing other people’s keys and walking into their houses, or hacking people’s credit cards and ripping off their money, or taking their lives and their money
    • Hidden microphones and cameras: Total lack of privacy
    • You are a homosexual
    • Are you a homosexual?
    • Budie holers
    • V— D—
  • WERE THESE THE SAMSKARAS OF A MIND CONTROLLER WHO WAS LOGGING ONTO MY MIND?
    • Conclusions Regarding the Nature of the Mind Controller
    • Inference of Felon Involvement
    • Why a Mind Control Victim Who Is Clair Gifted Hears the Subconscious Thoughts of the Mind Controller
  • MIGHT THE MEANING OF THESE SAMSKARAS HAVE BEEN INTERPRETED IN A NONHUMAN WAY BY MY COMMENSAL AND ADVENTITIOUS MICROORGANISMS?
  • MORE ABOUT THE WAY VIRUSES TALK

Dear Ones,

This blog has to do with some repeating subconscious malware phrases I had noticed back in 2016. I have two interpretations for the phrases; the first has to do with the character of a mind control cult leader I thought at the time was trying to control my mind.

I have a concern that the mind controller I speak of in the blog might be putting the idea into the minds of men I know, that I am writing about them, when in fact I am not. I hope this makes it clear that the below blog is not written about men I know as friends, relations, or acquaintances.

In addition it seemed to me that my own commensal and adventitious microorganisms had taken up the phrases and ‘made them their own’ by attaching to them significance to do with their own cultural understanding, which I am sure you will agree must be very different from our own.

REPEATING MALWARE PHRASES OR SAMSKARAS THAT I HEARD IN 2016

The malware phrases were …

  • My life has no quality
  • You have no personality
  • You are one big ego
  • Astral stories about people stealing other people’s keys and walking into their houses, or hacking people’s credit cards and ripping off their money, or taking their lives and their money
  • Hidden microphones and cameras: Total lack of privacy
  • You are a homosexual
  • Are you a homosexual?
  • Budie holers, and
  • V— D—

I have two possible interpretations of the malware, which was startlingly foreign to me, from the stance of my personal thoughts.

WERE THESE THE SAMSKARAS OF A MIND CONTROLLER WHO WAS LOGGING ONTO MY MIND?

At first I thought they were the malware or samskaras of a meditation group leader who was an adept at mind control, and who seemed (although I would be the first to say this could not be proven) to be leaping upon me till about December 2016, when I had a surveillance system installed in my Los Angeles home.

Conclusions Regarding the Nature of the Mind Controller

If that were true then judging from the import of the phrases listed below, I would be looking to identify that mind controller as follows: He might have been depressed (‘My life has no quality‘).

He might have been told in his youth: You have no personality. That might mean he was an antisocial personality who used various social masks to fit in with other people; or he might have been an empath who changed personalities depending on the person with whom he was being empathic.

In his younger years, maybe by a spiritual teacher he followed, he may have been told: You are one big ego … and this may have lowered his self-esteem. Or he may have been told it by a woman he admired, and his pride might have been wounded by that statement.

Astral stories about people stealing other people’s keys and walking into their houses, or hacking people’s credit cards and ripping off their money, or taking their lives and their money … Possibly these were past events to do with him or his followers and about which he felt guilty.

Hidden microphones and cameras: Total lack of privacy … I interpreted this as fear of the truth coming out.

“You are a homosexual”“Are you a homosexual?” … and … “Budie holers”… I thought these might mean that the man was a homosexual, or a latent homosexual.

“V— D—” This phrase that I heard in the astral airs over and over again in the year 2016 consisted of two names, a first name and a surname.

The first name was that of a man in the group taught by the person I thought might be the mind controller whose subconscious thoughts I kept overhearing. That person was a long-time follower, very loyal to the leader.

The second name was the surname of a person I thought to be involved in another mind control cult centered in Los Angeles, but which had established meditation groups in other towns … miraculously, it seemed to me … the moment I arrived in them between the years 2019 (the year of the death of my mother) and 2016.

What did the juxtaposition of the two words mean? Had the first person spent time in the group with which the second person was affiliated, or maybe vice versa? Had the first person married the second person? Were the two mind control groups in cahoots? Were both people lovers of the mind controller? Or maybe mind controlled by him? What was up with that, anyway?

Inference of Felon Involvement

The cessation of mind control attempts, subconscious catch phrases, and home invasion thoughts originating in that other mind in December 2016 indicates to me that the mind controller, or else some of his followers, were felons afraid of detection by surveillance cameras. That is the inference I drew.

Why a Mind Control Victim Who Is Clair Gifted Hears the Subconscious Thoughts of the Mind Controller

I feel that the reason a mind control victim who is clair gifted hears the subconscious thoughts of the mind controller, is that the mind controller inadvertently creates a link between himself and his intended ‘mark’, so that thoughts flow back and forth between them, without him being able to stop their flow unless he gives up the mind control attempts. If he were to do that, then little by little the subconscious interchange would cease … as indeed has been the case with the clair interchange between the mind controller in question (whoever he may be) and me, since my home surveillance system was installed in December 2016.

MIGHT THE MEANING OF THESE SAMSKARAS HAVE BEEN INTERPRETED IN A NONHUMAN WAY BY MY COMMENSAL AND ADVENTITIOUS MICROORGANISMS?

Then after awhile I thought these repeating subconscious malware phrases (or ‘samskaras’) I used to hear on the astral plane might pertain to life cycle activities of or cultural difference among our commensal and adventitious microorganisms.

For instance, It seems the repeating phrase “My life has no quality” has to do with lowered blood sugar; it may be a lament of the yeast cells that inhabit the human body.

The repeating phrase “You have no personality” is apparently a comment of the Martian bacterial colonists of the human colon; it may have to do with prejudice against the yeasts, which are quite a bit more simplistic in their language and thought forms than are the Martians.

The repeating phrase “You are one big ego” is apparently a comment of the Martian bacterial colonists of the human colon; it may have to do with Higher Mental Body functions, as our Martians have a greater influence on the Lower Mental Body, where they live, than on the Higher Mental Body.

Astral stories about people stealing other people’s keys and walking into their houses, or hacking people’s credit cards and ripping off their money, or taking their lives and their money may have to do with our body cells and the Martian bacterial colonists of the human colon recoiling in horror at the attacks of viruses.

Hidden microphones and cameras: Total lack of privacy: This may have to do adjustment by our Martian bacterial colonists of the colon to the awakening of human telepathy globally. The Elder Race, the Martians, are far more telepathic than we, and in fact it was through their expertise in DNA manipulation that most of Earth species came into being. More about this in my blog category: Mars – Martians – the Elder Race

Not mentioned in the above-referenced blog are these repeating subconscious phrases:

“You are a homosexual” … Yeasts say this over and over again, and very enthusiastically, when there is plenty of sugar circulating in the blood, so that they can joyfully accomplish assexual reproduction

“Are you a homosexual?” is used by the yeast inhabitants of our bodies when greeting newly arriving yeasts. As I understand it, they are asking whether the newcomers are the sort that can have sexual reproduction with them, or whether they are they will be reproducing asexually.

“Budie holers” is a repeating, derogatory phrase used by the Martian bacterial colonists of the colon with regard to the HIV virus

“V— D—“ was a repeating, derogatory phrase used by the Martian bacterial colonists of the colon with regard to the viruses that attempt to cause sickness in their human ‘space stations’. They have since moved along to other phrases with the same meaning, but I cannot recall what those are right now.

MORE ABOUT THE WAY VIRUSES TALK

The viruses talk in a sharp, sinister whisper full of intent to rip off the lives of the people in which they find themselves. They are villainous little dudes; which leads me to think that listening to pure musical harmonics might cause them to fare less well inside us.

If you hear repeating phrases on the astral plane, and know a little about microbiology, I encourage you to to match the phrases you hear to the wants and needs and cultural expectations of some of our commensal organisms as well.

In love, light and joy,
I Am of the Stars

I added an altered portion of the above blog as a postscript here …

Link: “Hellworld Scenes and Amazing Astral Stories,” by Alice B. Clagett, published on 24 May 2016, revised … https://wp.me/p2Rkym-5j0 ..

…………………..

Creative Commons Attribution-ShareAlike 4.0 International License

Except where otherwise noted, “Awakening with Planet Earth” by Alice B. Clagett … https://awakeningwithplanetearth.com … is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0) … https://creativecommons.org/licenses/by-sa/4.0/ ..

…………………………………………………….
…………………………………………………….

ego, you have no personality, you are one big ego, my life has no quality, murder, identity theft, astral realm, astral plane, private property, freedom of speech, viruses, yeasts, bacteria, Martians, microorganisms, body cells, Lower Mental Body, Higher Mental Body, Elder Race, V— D—, budie holers, HIV virus, you are a homosexual, are you a homosexual, samskaras, malware, interspecies communication, mind control, mind control cults, homosexuality, self-esteem, personality, antisocial personality, empathy, clair senses, telepathy, human telepathy, nonhuman telepathy, amateur sleuth, law enforcement, crime, crime prevention, theft, home invasion, cybercrime, murder, psychic terrorists, psychic spying, crime families, cults that kill,

Cybercrime Hackware – Stalkware: Car Infotainment Systems Gone Rogue ? by Alice B. Clagett

Published on 25 July 2019

Dear Ones,

Some while ago, I had the strangest intuition regarding car infotainment and GPS systems; on the psychic plane, I heard there is backend hackware or stalkware installed that allows the cyber criminal purchaser to track the location of any car, globally, through GPS. The systems that came up in the clair chatter were auto Bluetooth, Pandora, and GPS systems (OEM, rather than after-market).

I heard also, on the clair plane, that the Secret Service … would this be United States Secret Service, such as the FBI, the CIA, or Homeland Security; or would it be a foreign Secret Service? … had intended to use this equipment to track and apprehend drug traffickers,  to compensate for a dwindling budget and reduced staffing, but that it had gone rogue through double dealings by a United States expatriate entrepreneur who designed the hackware or stalkware, and who was later expelled from the country he removed to (possibly Japan?).

Sometimes clair chatter has some truth to it, and sometimes it is just Hollywood fiction. Are there any facts out there regarding this astral rumor? Have there been any legal actions filed, for instance?

If there is any truth in the clair chat, then it would be important to find a way to disconnect these devices from our cars, to prevent our being tracked and subjected to crimes of convenience by drug dealers, Mafia sorts and street gangs, I feel.

I wonder if there are savvy auto mechanics out there who could provide this niche market service for car technophobes?

In love, light and joy,
I Am of the Stars

…………………..

Creative Commons Attribution-ShareAlike 4.0 International License

Except where otherwise noted, “Awakening with Planet Earth” by Alice B. Clagett … https://awakeningwithplanetearth.com … is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0) … https://creativecommons.org/licenses/by-sa/4.0/ ..

…………………………………………………….
…………………………………………………….

cybercrime, law enforcement, automobiles, hackware, Pandora, Bluetooth, auto technophobes, auto infotainment, mafia, auto mechanics, Japan, international intrigue, crime families, killing cults, street gangs, stalking, stalkware, Secret Service, CIA, FBI, Homeland Security, drug dealers, drug war, disclosure, conspiracy theory,

A Nightmare about Lightworkers and Ascensioneers . by Alice B. Clagett

Written and published on 17 July 2019
Previously titled: Vision: Lightworkers and Ascensioneers

Dear Ones,

Here is a vision I had last night; I thought I had best publish it, in case it should prove true …

Since 2012, there has been an attempt by black magicians to disband the Lightworkers, Pathfinders, Wayshowers, and Ascensioneers.

Apparently, there are 12 cybercriminals posing as web programmers and techies who have colluded in a campaign to lag our tags, categories, and urls with Google. Should this prove true, I feel it may be circumvented through manual submission to Google. Also, you may wish to speak with your website hosts about it.

On the psychic plane, black magickers have put quite a strong effort into turning Lightworkers, Pathfinders, Wayshowers, and Ascensioneers away from each other through casting aspersions regarding scarcity, greed, and competition, and also apparently through initiating frivolous lawsuits against us and psychically implying these legal actions are by other Lightworkers, when in fact this is not true.

A new Solar Cycle is dawning. Let us find each other once again, and share our work with the world.

God bless each of you with Light and love and joy!

Alice B. Clagett
I Am of the Stars

See also … Link: “Can Lightworkers Be Bound Down by the Dark?” channeled by Alice B. Clagett, written and published on 25 May 2020 … https://wp.me/p2Rkym-ijY ..

…………………..

Creative Commons Attribution-ShareAlike 4.0 International License

Except where otherwise noted, “Awakening with Planet Earth” by Alice B. Clagett … https://awakeningwithplanetearth.com … is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0) … https://creativecommons.org/licenses/by-sa/4.0/ ..

…………………………………………………….
…………………………………………………….

ascensioneers, lightworkers, healers, ascension, disclosure, black magicians, visions, cybercrime, Solar Cycle, almanac, lawsuits, frivolous lawsuits, greed, competition, scarcity, dreams, nightmares,

Obsession as Folie à Deux . by Alice B. Clagett

Written and published on 5 June 2019

  • OBSESSION AS FOLIE À DEUX
  • BULLYING EXPRESSED AS RAPE FACILITATED BY FOLIE À DEUX PARTNER
  • SUBCONSCIOUS INVOLVEMENT IN REPETITIVE ACTING OUT: REPRESSED MEMORIES – FUGUE STATE
  • SUBSTITUTION OF NAMES AND OBJECTS IN DAYDREAMS BECAUSE OF FEAR OF SOCIAL CENSURE
    • Image: “Around the Dragon’s Broken Neck Hangs the Medal of Saint Lazarus”
  • FOLIE À DEUX REGARDING SAMSKARA OF SOCIALLY FROWNED UPON EXPRESSION OF SEX DRIVE
    • Shared Identity in Folie à Deux
  • FOLIE À COTERIE REGARDING CON ARTIST GROUP OR CYBERCRIME CLUB
  • BULLYING AND SADOMASOCHISM

Dear Ones,

OBSESSION AS FOLIE À DEUX

Might obsession or possession be considered an instance of folie à deux, in a psychological context? That is to say, might the obsessed person have subconsciously agreed to be ‘obsessed’ by the shadow of the personality of another person? Are there long-standing friendships in which this is the case?

BULLYING EXPRESSED AS RAPE FACILITATED BY FOLIE À DEUX PARTNER

An instance might be where one man has a tendency to bullying, yet was taught as a child not to do so. Still, he has the samskara of bullying, not yet cleared from his Soul wounding, but unknown to himself in adulthood.

I hypothesize that the subconscious mind of such a man might lead him to develop a friendship with a man who has a similar samskara, and less inhibition toward acting out. Then the first man might put his friend in a position of acting out the bullying, which would be gratifying to both men … the one, at first hand, and the second, through putting himself in the place of the man who achieves the act in the physical realm. In other words, the first man enjoys the act of rape ‘by proxy’ through the second man, who ‘stands in’ for him.

Here is an instance I heard of on the astral plane in recent years: One man might like to rape women, but knows it is wrong. He forms a friendship with another man, who flat out likes to rape women. The first man charms and woos women, and seduces them. These women fall head over heels for him, and give him a key to their abode.

The first man makes a copy of the key for his friend, who then slips in at night, blindfolds the wooed women, and rapes them.

The women can tell that the manner of sexual intercourse is very different from that of their lover. But they are confused, because the two men resemble each other in body weight, muscle mass, height, and hairdo. Because they were blindfolded, they do not know what happened.

These actions may occur in a mutual fugue state, and not be remembered by either man; if brought to their attention, they may or may not remember the events that occurred or why they occurred.

SUBCONSCIOUS INVOLVEMENT IN REPETITIVE ACTING OUT: REPRESSED MEMORIES – FUGUE STATE

This lack of understanding of repetitive events, failure to remember them, and inability to change them, I posit would have to do with the subconscious repression of the first man, due to early childhood parental caveats; the springing forth of the repressed emotion, and its expression through obsession or ‘egging on’ of the second man, being the catalyst of the repetitive ‘acting out’; and then the boxing up of the emotion back into the subconscious mind of the first man, after the proxy act takes place.

The second man might remember the actions, but not feel that they were wrong or reprehensible, because his upbringing was different from that of the first man.

See also: Link: “Black Magic: Fugued or Tranced Person / Obsessed ‘Acting Out’ Folie à Deux,” by Alice B. Clagett, filmed on 21 October 2016; published on 25 October 2016 … https://wp.me/p2Rkym-6k5 ..

SUBSTITUTION OF NAMES AND OBJECTS IN DAYDREAMS BECAUSE OF FEAR OF SOCIAL CENSURE

Or this might be a recurrent daydream shared by the two men, played out using different women that they know, and maybe not substituting the names of other women in the daydream, so as to conceal their ‘mark’ or ‘target’ woman.

It is also possible that such a recurrent daydream might migrate to the shared thought of sex between the two men, but using the name of a woman as their fantasy sex object so as to avoid social censure on the astral plane.

Cultural homophobic concerns regarding such migration from shared male daydream of a female sex object, to mutual male astral sexual stimulation are, I feel, to some extent expressed in this artwork …

ADULTS ONLY (PG-13 – NUDITY): Image: “Around the Dragon’s Broken Neck Hangs the Medal of Saint Lazarus” by various artists (Hospital Productions) … https://i.scdn.co/image/a34ab903fe77a65c8ebbd5f54306900fc3867baa DESCRIPTION: This is a photograph of a man standing by an oil barrel, and holding in his right hand a big tin can. In front of him is a person with a scantily clothed woman’s body and a man’s bowed head. To me, it seems as if the first man is about to pour something from the can onto be back of the person in front of him.

In fact, I feel this type of male shared daydream, whether by two men or by many, putatively targeting a lone woman, may be the basis for male athletic camaraderie and for men who socialize together in an all-men’s club or in cultures and religions worldwide where men and women socialize in separate groups.

FOLIE À DEUX REGARDING SAMSKARA OF SOCIALLY FROWNED UPON EXPRESSION OF SEX DRIVE

Another manner of expressing this form of folie à deux might take place where one man is taught as a child to act with propriety. Yet he has a samskara of acting out in ways socially frowned upon, such as through sex work or pornographic movie acting.

This man does not engage in these behaviors, but still has the Soul wounding that, in another lifetime perhaps, expressed itself in these activities. Subconsciously he longs to express himself in this way.

The first man forms a friendship with a second man who has no inhibitions regarding these behaviors. The first man then eggs the second on to sex work, and facilitates this by providing a shared workspace for the activity. In that way he enjoys the sex work activity ‘by proxy’.

Or, the first man gets a job as a porn star, but at the last minute, for the closeup of the act of sex, the second man stands in and his genitalia are photographed in the act of intercourse. One might feel that the first man had acted in a way that contravenes societal expectations, but he might argue that the physical act was that of someone else, and not his own.

Shared Identity in Folie à Deux

That the second man ‘stands in’ for the act of sex can, I feel, lead to a subconscious misunderstanding between the two men. They may begin to answer the phone and transact business and personal relationships as if each were the other. They may not, in their subconscious minds, make the distinction ‘I’ versus ‘other’.

This misunderstanding may be abetted by similarity of physical appearance. In short, each may confuse himself with his friend. They may even feel they are the same person. This hypothetical instance might, I feel, be yet another expression of folie à deux.

FOLIE À COTERIE REGARDING CON ARTIST GROUP OR CYBERCRIME CLUB

In a similar way, a con artist group of people, or a cybercrime club, might be considered folie à coterie, as confidence games are, I feel, a form of bullying or one-upmanship.

BULLYING AND SADOMASOCHISM

In a psychological context, I feel these two forms of folie relate to the sexual dysfunction termed ‘sadomasochism’.

Alternatively, they might be thought of as daydreams expressing male bonding.

In love, light and joy,
I Am of the Stars

…………………..

Creative Commons Attribution-ShareAlike 4.0 International License

Except where otherwise noted, “Awakening with Planet Earth” by Alice B. Clagett … https://awakeningwithplanetearth.com … is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0) … https://creativecommons.org/licenses/by-sa/4.0/ ..

…………………………………………………….
…………………………………………………….

bullying, rape, daydreams, folie à deux, obsession, subconscious, Soul wounding, samskaras, psychology, psychiatry, acting out, folie à coterie, cybercrime, confidence game, sadomasochism, societal expectations, one-upmanship, substitution, fugue state, shadow of the personality, male bonding,

Call to Action: Cybercrime Alert: Geotracking and Home Burglaries . by Alice B. Clagett

Published on 15 February 2019

Dear Ones,

This is a Call to Action: I ask that the danger of criminal snooping on individuals’ geotracking, in its many iterations, whether …

  • through online mapping services, online hotel reservations, or online near instantaneous credit card transaction postings;
  • through electronics in modern cars; or
  • through GPS implants in transportable modern electronics

… to the end of home burglary while people are travelling, or with a view to threat to life and limb while travelling … be evaluated, and the results presented to the public.

I note what seems to loom as a critical danger of identity theft and potential location tracking in Microsoft’s centralization of customer identity and habit information, and ask that this danger by evaluated by cybercrime analysts. If there is a danger, what is its urgency; and how may it be mitigated?

In love, light and joy,
I Am of the Stars
…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
…………………………………………………….
…………………………………………………….

call to action, calls to action, geotracking, GPS, burglary, burglaries, law enforcement, cyber crime, cybercrime, identity theft, Microsoft,

Call to Action: Calculate Cybercrime Drag on U.S. Economy . by Alice B. Clagett

Written and published on 15 February 2019

Dear Ones,

This is a Call to Action: I ask that economists calculate the current cyber crime drag on the United States economy.

Also that they calculate the tipping point at which an internet presence for banks, stock brokerages, and online stores will become no longer economically feasible.

Has the tipping point already been reached? If not, can the date be extrapolated, and may financial institutions and online merchants be informed of this date, so that the move of financial matters away from the internet may be accomplished in an orderly way?

Telephone and fax offer alternatives to conversations currently taking place online. I gather that phone service may also have been cyber criminalized, and request research into resolving telephone privacy as well as cyber secure faxing, If these cannot be attained, then I suggest advising telephone service customers of this, so that an orderly move can be made back to paper correspondence and to the United States mail.

I note, for instance, the need that will arise for goods catalogs, such as the old Sears catalog, to replace Internet giants such as Amazon.com, and the need that will arise for greater stocks of inventory in local community stores.

I note the coming need of greater personnel in the United States Postal Service, to provide service for transactions formerly posted online.

I note the coming need for more paper production (hence more timber planting) to replace paperless online transactions.

In love, light and joy,
I Am of the Stars
…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
…………………………………………………….
…………………………………………………….

economics, economy, calls to action, call to action, cyber crime, cybercrime, timber industry, store inventories, United States Postal Service, phone service, telephone service, fax service. industry, banks, financial institutions, stock brokerages, online marketing, communications, telecommunications, internet, finance, timber industry, paper industry, online retail, housed retail, banks, stock brokerages,

Technical Issues: How to Sign Out of Most of Your Websites on Chrome . May Help Prevent Computer Hacking / Cloning . by Alice B. Clagett

Published on 6 November 2017
Previously titled: Chrome: How to Sign Out of Most of Your Websites . May Help Prevent Computer Hacking / Cloning

Dear Ones,

Per Chrome, the below procedure will sign you out of most of your websites.

My hope is that it will prevent computer hackers or cloners from gaining or retaining access to these websites.

So, for instance, they won’t be able to shop on your Amazon account or remove money from your checking account, etc, etc.

HOW TO SIGN OUT OF MOST OF YOUR WEBSITE ON CHROME … MAY HELP PREVENT HACKING / CLONING

  • Turn on Chrome.
  • Top right of screen, see the 3 vertical dots? – click this.
  • On the first popup menu, click: History
  • Then on the secondary menu, click: History
  • On the third menu, click: Clear Browsing Data
  • On the fourth menu,
    • Select: Cookies and other site data,
    • And deselect other selections.
  • Then Click this button: Clear Browsing Data

. . . . . . . . . .

In love, light and joy,
I Am of the Stars

…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
…………………………………………………….
…………………………………………………….

crime, hacking, cloning, Chrome, computer hacking, computer cloning, cybercrime,

The Karma of Hacking . plus House Break-ins; Communications and Transportation and Crime . by Alice B. Clagett

Written and published on 29 July 2017; revised

  • THE KARMA OF HACKING
  • ON THE WILDING OF SECRET SERVICE CYBER SPYWARE
  • THE ‘ONCE REMOVED’ QUALITY OF HOUSE BREAK-INS AND BURGLARIES: ASTRAL STORIES
  • COMMUNICATIONS / TRANSPORTATION AND CRIME: PHONE, INTERNET, AND POST OFFICE
    • Hacking Personal Computers through Phone Lines
    • Astral Rumor: Facebook Hacking and Cloning
    • Has the Drug Industry Gone Postal?
    • Private Helicopter Pads and Drug Transport
    • State Check Points on Interstate Freeways
    • Mass Media, Drugs, and Violence
  • TRACKING OF PERSONAL CARS AND PERSONAL TRAVELS
    • Location Detection of Personal Automobile through ‘Backdoor’ Factory-Installed Software?
    • Smartphone, Cell Phone, and Facebook Location Detection Software
    • The New Clairs and Clearing of Criminal Tendencies from the Astral Body
      • Location Detection Backdoor Software Claims
      • Spy Camera Claims and Their Easy Resolution
  • ON EVALUATING AND ACTING ON ASTRAL STORIES

Dear Ones,

THE KARMA OF HACKING

Times are tough, and many honest people, worldwide, are turning to cyber crime as a way to make ends meet, and to support their families …

It seems that cyber attacks, as with house break-ins, are sourced from our wider circle of friends and acquaintances, including social friends and those we patronize for business.

From my research, I was surprised to find recently, that even long-time friends and acquaintances of folks’ families are not immune from preying on their good friends and relatives, or relatives by marriage, on the pretext that their victims will never know that they are being attacked.

If you and your family are very computer savvy, I beg you to consider the karma of hacking; the karmic results that will manifest in your lives, should you opt to hack.

Consider, for instance …

  • The loss of long-time friendships,
  • The lack of goodwill from the friends and neighbors that might be victims,
  • And the catastrophic results to a family’s legal computer and internet enterprises.

As I understand it, the penalties for hacking and ID theft might be in the range of …

  • $3000 per instance and/or up to 20 years in jail.

How would it be for a family, if one member got a prison sentence? If the penalty were to be financial, how would that affect the family savings account?

Children learn how to interact with the world at their parents’ knee, and by watching what their parents do. How would it be if our children learned to be cyber criminals so as to impress their parents? What future would our children have?

For instance, what if detection of hacking results in a felony conviction? There are restrictions on the liberties of felons, even after they have served time …

  • Felons cannot leave the country.
  • They cannot bear firearms.
  • They cannot serve on juries.

To me, these are very important liberties, the loss of which would be inconceivable. Yet every felon must face their loss.

For those of my readers who are computer savvy: Please take the above into consideration. If you see merit in it, please forward it to your computer savvy friends.

I wish the best for each of you in the coming times.

ON THE WILDING OF SECRET SERVICE CYBER SPYWARE

The astral airs have it that Secret Service cyber spyware worldwide has gone wild, through employees taking software home for personal use, such as to spy on spouses, relatives and friends.

Maybe their less-secure home computers are being hacked by cyber criminals for the software, who then use it for their nefarious undertakings.

Maybe disgruntled ex employees, fired for drug use, are aligning with the drug lords and selling the software as a stopgap till they find employment elsewhere.

Whatever the mode has been, if the astral airs are to be believed, some pretty potent secret service software has gone wild, and is now in the hands of crime families, drug lords, and the mobs and mafias around the world.

What can possibly be done to protect the average Joe and his family from the wiles of these career criminals?

THE ‘ONCE REMOVED’ QUALITY OF HOUSE BREAK-INS AND BURGLARIES: ASTRAL STORIES

With regard to tips to family and friends on house break-ins and burglaries, here are two examples from the clair plane …

  • A woman who has a storefront acupuncture business along with her husband, copies clients’ drivers licenses, which have their addresses on them, when she takes payments. She has an opium addiction, and passes the addresses on to a younger member of her extended family, who specializes in house break-ins. He pays her for the tips on the addresses, and this helps support her opium habit. Because she and her husband are well respected in the community, they are unlikely to fall under suspicion.
  • A young man works for a rental car company as the person who drives clients home after they return their rental cars. He reports to an extended family member on likely looking houses for break-ins. The tips he gives to his burglar family member are not intentional; he wants to keep his job. But both are psychic … as are most people in these days of global telepathy … and the driver cannot keep this information from his burglar friend. Further, because of family bonds, he cannot report the criminal or curtail his activities.

The difficulty here, as telepathy sweeps round the globe, is that people are continuing with crime as usual. Hoping they will get away with it a little longer, despite knowing that an ever-widening circle of acquaintances know what they are doing.

What will happen as these issues of crime amongst neighbors and extended family begin to settle out, is anyone’s guess. I am hoping for a quiet and peaceful transition, insofar as that is possible.

COMMUNICATIONS / TRANSPORTATION AND CRIME: PHONE, INTERNET, AND POST OFFICE

Hacking Personal Computers through Phone Lines

There is an astral rumor that there is a backdoor to people’s phone lines through the online customer service. The rumor goes that it is easy to hack the phone line online passwords, and so gain access to people’s phone messages, and hear or delete them.

There is another rumor that, when people opt for the cable service that combines internet with phone, on one line, crooks can call the phone line, using a randomized phone number, and hack their intended victim’s computers through the phone line back door.

If true, this would allow identity theft, as well as credit card fraud, and it would allow sensitive personal documents to be stolen.

Astral Rumor: Facebook Hacking and Cloning

There is an astral rumor that Facebook has a backdoor to do with cloning folks’ desktops and backing up their hard drives. To avoid this, rumor has it, one must sign off Facebook after each use, and also disable Facebook chat, which is casting up messages on personal computer desktops.

Has the Drug Industry Gone Postal?

The buzz in the astral airs has it that mafia in its various iterations worldwide does its best to place a ringer in post offices, and in the offices of private mail carriers, for nefarious reasons to which they alone are privy. One might hazard a guess that a goal might be postal shipment of drugs and other illegal items.

There is another astral story that crime families are attempting to cut deals with cable carriers to hardwire or software hack personal internets.

Private Helicopter Pads and Drug Transport

Could the astral rumors be true? Are private helicopter pads being used to transport drugs into urban areas? If so, would decriminalization of drugs help with regulation and taxation of the drug industry?

State Check Points on Interstate Freeways

Yet another astral rumor: Are male drug runners at State checkpoints on Interstate freeways disguising themselves as women so as to avoid the typecasting warning signs from popping up with the roadside checkup personnel?

Mass Media, Drugs, and Violence

There is an astral rumor that the themes of the mass media are being financed by mafias worldwide to drum up public support of criminal activities and to cause people to long to take drugs and engage in acts of violence.

Then, there is another astral rumor that the people involved in mass media creation … whether producers, writers, directors, or actors, I have not heard one way or the other … might be involved in drugs and violence and so on, and thus prone to create works of art based on their own experience of life.

Of course, it might also be that many people are already in that space, and longing to take drugs and engage in acts of violence; as I recall, this is closer to the theories proposed by mass media moguls: To wit, that the mass media are a backward looking indicator that creates on the basis of public tastes.

TRACKING OF PERSONAL CARS AND PERSONAL TRAVELS

Location Detection of Personal Automobile through ‘Backdoor’ Factory-Installed Software?

Another astral rumor that I heard in 2016, is to this effect: There is some software purportedly installed in modern, electronic cars, and typically turned on by consumers … could the rumors be referring to Bluetooth or Pandora, I wonder? … that allows crooks to trace the whereabouts of people on the road. The wild astral story had it that the creator of the software, whatever it was, and whoever he was, had relocated to … was it Japan? … and was living the good life there. Maybe this has to do with mapping software in the cars?

Smartphone, Cell Phone, and Facebook Location Detection Software

Then there is a well-breezed-about story, I guess true, to the effect that smartphones and Facebook have location software that, if not disabled, allows a person’s whereabouts to be discovered. I think everyone knows about that, though.

The New Clairs and Clearing of Criminal Tendencies from the Astral Body

Location Detection Backdoor Software Claims. Location detection backdoor software claims are hard to track down, since one of the new clair abilities is to place oneself in someone else’s shoes, and in that way one might figure out someone else’s location. The trouble here comes with insufficient clearing of criminal malware concomitant with the new clair ability manifesting. I expect the Incoming Light will soon provide a fix for that … maybe even during the August 2017 Lion’s Gate.

Spy Camera Claims and Their Easy Resolution. The same is true of astral claims that there are ‘spy cameras’ in personal residences. What this apparently really is, is the new clair ability to ‘put yourself in someone else’s shoes’, combined with as yet uncleared voyeuristic tendencies (peeping tom propensities, for instance) or with the desire to frighten another person, so as to feel less afraid oneself during times of high Light.

So this last item is, in most instances, merely an annoyance. If you have any doubt about it, you can purchase an inexpensive wireless camera RF detector … see https://www.harborfreight.com/wireless-camera-rf-detector-95053.html … from stores such as Harbour Freight, and settle the issue definitively for the sake of the inner child within.

ON EVALUATING AND ACTING ON ASTRAL STORIES

If real life were half as scary as the astral stories, we would all be living in hell, rather than here on Earth. I guess the main thing about the astral stories is: We can take them with a grain of salt, unless evidence pops up that supports them.

Even then, when we have possible evidence in hand, the thing to do is to investigate, on the physical plane. Look folks in the eye … Ask questions.

In most cases, I find that what is actually taking place is a merging of our hellworld scenarios … the landscapes of our unconscious and subconscious fears, angers, and negative touch-points, with the brighter landscape of the conscious mind.

In Timeline terminology, we call this merging denser timelines with the brighter timelines made available to us through the Incoming Light.

What it takes to do the merge is a neutral state of mind. Keep the chest muscles relaxed. Then, as we undergo dharmic action … ‘right action’ … in the physical world, we can transform and merge the negative timelines with the New through the process of Personal Alchemy.

In love, light and joy,
I Am of the Stars

…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

…………………………………………………….
…………………………………………………….

cyber crime, crime, hacking, identity theft, law enforcement, burglary, house break-ins, worldwide telepathy, personal alchemy, mafia, dharma, acting out, right action, transformation, timeline merge, astral stories, timelines, crime families, crime prevention, electronic devices, disclosure,