Tag Archives: hacking

Identity Theft Tips . by Alice B. Clagett

Written and published on 24 August 2022
Location: Los Angeles, California

identity theft

Crime Tips

  • VIDEO BY ALICE
  • SUMMARY OF THE VIDEO

Dear Ones,

Here is a video with tips on dealing with identity theft. Hope it proves useful! There is an edited Summary after the video …

VIDEO BY ALICE

SUMMARY OF THE VIDEO

Hello, Dear Ones, It’s Alice. I Am of the Stars.

I have a few tips for you about identity theft today. The first one has to do with the bench on which I am sitting. Let’s imagine that you had a picture in hand or a video in hand in which someone else was sitting on this very bench. And you were trying to figure out if it was the same person as I am.

Here is one tip: You can look at the back of the bench, and you can look at the top of the head of both people, and try to figure out if the top of the head is taller or the same in both pictures. That will help you to figure it out. Maybe it is the same person. Or probably it is a different person.

Then we have hands. Some people have very large hands with very long fingers, as do I. Other people have very small hands with very small fingers. And there is everything in between. If you look at a person’s hands, and compare them to the hands of the other person in the other photo, you are likely to figure out if it is or is not the same person.

Another possibility is ears. Ears are very distinctive. No two ears on separate people are likely to be the same, except in the case of identical twins. If you get a chance to look at the ears on both photographs or both videos, you will get a better idea whether or not you are looking at the same person.

As to voice: Voice on video or voice on the movies is really no indication whatsoever of who is talking on the video or on the movies. Voices can be dubbed in, or synthesized voices can be added, and the original voice track can be silenced. This can even be done on home video; it is very easy to do. So voice is no indication.

Mannerisms, in a person that is not affecting a mannerism, are an indication. You might look at the usual way that they hold their hands; or the usual way that they gesture; or the gait; or the way that the hips move when they walk; or the tone of voice; or the pauses in the voice … and see if those two match.

Of course, a good actor could do all that, so that is not such a good indicator. But for an unaffected situation, it might be possible to tell.

I know, from reading the “AARP Bulletin” … https://www.aarp.org/bulletin/ … as well as from reading other sources … that there is quite a problem these days with identity theft, with synthetic identity theft, with cybercrime, and with hacking. It may be confusing to just about everyone. I hope these tips help you to stay scam-free and to keep those hard-earned bucks in your pocket.

I hope you will not be taken in by people who sell, for instance, houses without the owners’ permission … which can be a big problem … or people who pretend to own the money in the bank that is really not their money or their bank … and people who try to discredit other people … maybe business rivals. Or in my case, in the literary world, there are attempts to steal intellectual property. Terrible things go on, by pretending that people who are of good repute and upstanding reputation are the exact opposite. So it is hard to tell that.

I usually find the best thing is just to go up and talk to a person, or talk to them on the phone; and try and figure out what is really so.

I hope these tips help a little. I thought they might go well together with this blog …

Link: “Amateur Sleuth: On Matching Up Mugshots,” by Alice B. Clagett, written and published on 29 April 2018; updated on 22 August 2020 and 24 August 2020; revised … https://wp.me/p2Rkym-8As ..

That blog attempts to explain whether two mugshots are of the same person … despite disguises and changes in date of birth and so forth.

That is all I have for you right now.

God bless you all,
And keep you safe,
And be with you
Through all your days.

In love, light and joy,
Alice B. Clagett
I Am of the Stars

…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
…………………………………………………….
…………………………………………………….

crime prevention, identity theft, cybercrime, hacking,

Image Words: The Phrase ‘Backend Hacking’ . by Alice B. Clagett

Written on 11 January 2021; published on 28 January 2021
Location: Malibu Creek State Park, Santa Monica Mountains Recreation Area, Los Angeles County, California 

Dear Ones,

I had an intuitive thought just now that for those software programmers who work with the ‘backend’ of programming … like ecommerce and so forth … that if you are hacking and breaking into the ‘backend’ of other people’s online ecommerce solutions, then there is a chance that your subconscious mind might misinterpret all that. You might find yourself tending toward or participating in rectal rape, whether M2M or M2F.

The language of the subconscious mind and of the dream world consists of ‘image words’, as I have discussed in prior blogs. The subconscious mind had a lot to do with fear of death (first chakra), sexuality (second chakra), and desire to conquer the world (third chakra) … the impulses of the first three chakras oldstyle that comprise the ‘lower triangle’ of yogic lore.

The image word ‘backend’ is another word for the ‘fanny’. If an image word like ‘backend’ is spoken or thought all day long in a work context, the subconscious mind can misinterpret the image word in the world of subconscious thought as being in a sexual context, or in the context of desire to conquer the world through rape, which would be a combination of the impulses of the second and third chakras.

Acting out that subconscious ‘image word’ programming can cause your family life to break up, with your wife and child, your family, and it can cause you to gravitate into M2M rectal intercourse activities.

In love, light and joy,
I Am of the Stars

…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
…………………………………………………….
…………………………………………………….

image words, subconscious mind, cybercrime, hacking, rape, rectal intercourse, first chakra, second chakra, third chakra, lower triangle, personal chakras, chakras,

Hackster? . by Alice B. Clagett

Written and published on 7 January 2018; later in the day, the information in green font was added. The text in blue font was added on 8 January 2018.

Dear Ones,

I have been getting some astral intel regarding hacking and tracking personal computers and vehicles that I thought I would share. I have not researched this to speak of, so I do not have a clue whether it is really true, or whether it just represents fears that people may have about technology?

Anyway, if this has not been looked into, as to whether it is or is not true, then naturally, I feel it would be good to find out about it. I myself hope none of these rumors are true, as that would require lots of high tech problem solving to fix the ‘leaks’. Here goes …

There are rumors that computer chat programs and e-phone programs offer back doors for access to computers and handhelds, providing crooks with ways to hack private information and clone people’s computer desktops. It might possibly be good for chat programs such as Facebook Chat, Microsoft Messenger, and e-phone programs such as Skype and Google Voice.

There is a rumor that Frontpage and iTunes have hackable ‘back doors’ as well. Until this is disproven, it might be best to open these programs on your computer while offline.

There is an astral rumor that hacksters have access to books listing the IP addresses … or other identifiers, is it? … of the major motel chains and also of libraries, and that these somehow allow them access to our personal computers if we go online in a motel room or a library. Whether this is true or not, I don’t know.

I have also heard rumors of computer repair people who advertise that they will remove spyware from your personal computer, but that who instead install their own spyware, and gain access to your computer’s … is it IP address? … and password. And who then are able to hack your computer and perpetrate credit card fraud or other identity theft crimes. Or who may sell this information to other criminals, who then perpetrate these crimes. I hope this isn’t true!

Also, I have heard astral rumors that standard telephone services can be hacked via their online interfaces. From these interfaces, so the astral rumors go, a hackster can turn on or turn off the emessage-taking for another person’s telephone, and pick up or delete their messages. Apparently, there may also be ways to make phone calls as if they were coming from another person’s phone, but I do not know how this might be managed.

Further, there is apparently a back door to hardwired personal computers that is accessed via telephones installed on the same cable line, such as the newer phone-and-internet offerings tend to be. The hackster calls on your phone line, and … somehow or other … apparently patches into your computer. Whether you have to answer the ringing phone in order for the hack to occur, I do not know. I do surmise that the computer must be turned on at the time.

The way around this is to ask for a phone and internet deal where the phone is wired on a separate line from the internet. This arrangement is also good for times of electrical brownout or blackout, as it may be possible to plug a non-electronic phone (which you would have on hand for emergencies) into your phone jack during the emergency, and use your phone line, even though your computer is down. In that way you could report the power outage to your utility company, and would be able to call 911 in case an emergency arises during the electric brownout or blackout. So having a phone line separate from your internet service makes sense for a variety of reasons.

As to email, I have read that if your email password is hacked, then email can be sent by a hackster from your online email interface, and intercepted and deleted as well.

Then as to tracking devices such as GPS, and the pros and cons of wireless as opposed to cable and satellite …

According to the astral rumors, it is purportedly better to use cable rather than wireless connections for your laptop. Apparently, wireless connections can be snooped in upon by nearby people if they know about your IP address and computer password.

Rumor also has it that, through triangulation, computers with wireless enabled can be snooped upon through spy satellite programs. If this is found to be true, then it may be less true in rural areas than in cities. It may also be that a triangulated snoop connection in cities drops, then picks up again, as satellites crisscross overhead. So this manner of snooping … if true … may be only intermittently reliable.

Again on the astral plane, I have heard uneasy rumors that Bluetooth and Pandora, if enabled in the newer cars, might have backdoor programs installed that allow GPS tracking. I have seen GPS spy gizmos advertised online, that purportedly allow a person’s vehicle to be tracked; I do not know how prevalent the use of these might be, or how intermittent such surveillance might.

There is an astral hunch out there, to the effect that getting off asphalt roads, and onto dirt roads, or into wilderness areas, somehow disables GPS. Whether or not this is true, I have no idea.

I have heard an astral rumor that GPS can be installed in anything equipped with a solar cell … such as a lawn ornament.

A scarier rumor is that micro GPS chips can be placed in food, or body cavities on the sly, but that the power runs down on them in a few hours, and that internalized GPS and nano tech can be rendered nonfunctional by waving a magnet past them, just as larger electronic equipment can be rendered nonfunctional by being placed near a magnet.

Apparently, according to the astral rumors, the advantage of a powered GPS would be that the exact location of a person’s computer could be located, and homed in upon by a spy satellite, the theory being that would allow a secure hackster connection to a wireless enabled personal computer or handheld. If this is true, then it would be good to check up on the look of GPS tracking devices and check around the home and car for them, I am supposing.

Of course, an obvious answer to the issue of spy surveillance is to go off-grid and live the simple life. Further, this kind of lifestyle is bound to cut down on the damage done our bodies by artificial electromagnetic fields, such as electric lines, electric appliances, and electronics.

It seems to me that the financial world is going to have to come to terms with the seeming fact that placing financial information online is untenable, as it puts this information up for grabs by hackers everywhere. Even if a person refuses online access to, say, their bank, their bank information is still available, online, to those who have hacked and stolen that person’s identity.

The numbers of hackers in the world today are legion; and to the worse, according to the astral rumors, they feel a righteous thrill about it. To judge by the astral airs, they feel it is just a game … that they are …

  • ‘getting one over’ on their friends and neighbors,
  • ‘getting what’s theirs’,
  • getting a leg up,
  • playing the ‘one upmanship’ game,
  • helping their children get a college education,
  • ‘playing ball,’
  • engaging in Yankee competition …

The justifications or rationalizations, the specious reasons for ripping off friends and family are legion.

  • But what of the fabric of our society? What will become of us?
  • What will become of our economy, our financial system, our way of life, if hackstering runs wildly through our communities?

Well, shall we not get to the bottom of these rumors about the unsafeness of life in the ‘burb?

  • Are we safe, or are we not? If not, then what can be done about it?
  • Need we ramp up our computer savvy?
  • Ought we ditch our computers altogether, and, like the Roman emperor Gaius Aurelius Valerius Diocletianus, throw up our hands and say: Enough! I shall give up the power game, and retire to my country villa to grow cabbages! Let the rich and powerful come to me there, should they wish to consult me!

I wonder if anyone showed up, there in Gaius Aurelius’ country villa? Or whether, in peaceful solitude, he tended his vegetable garden, heard the early morning birdsong, gloried in sunlight and in the gentle touch of rain, and thanked the gods for a chance to live like an emperor of the natural world!

In love, light and joy,
I Am of the Stars
…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
…………………………………………………….
…………………………………………………….

Gaius Aurelius Valerius Diocletianus, hacking, identity theft, geolocation, GPS, spyware, hacksters, computer crime, law enforcement, safety, off grid, sustainable living, abundance, money, security, country life, electronic devices, one-upmanship,

Technical Issues: How to Sign Out of Most of Your Websites on Chrome . May Help Prevent Computer Hacking / Cloning . by Alice B. Clagett

Published on 6 November 2017
Previously titled: Chrome: How to Sign Out of Most of Your Websites . May Help Prevent Computer Hacking / Cloning

Dear Ones,

Per Chrome, the below procedure will sign you out of most of your websites.

My hope is that it will prevent computer hackers or cloners from gaining or retaining access to these websites.

So, for instance, they won’t be able to shop on your Amazon account or remove money from your checking account, etc, etc.

HOW TO SIGN OUT OF MOST OF YOUR WEBSITE ON CHROME … MAY HELP PREVENT HACKING / CLONING

  • Turn on Chrome.
  • Top right of screen, see the 3 vertical dots? – click this.
  • On the first popup menu, click: History
  • Then on the secondary menu, click: History
  • On the third menu, click: Clear Browsing Data
  • On the fourth menu,
    • Select: Cookies and other site data,
    • And deselect other selections.
  • Then Click this button: Clear Browsing Data

. . . . . . . . . .

In love, light and joy,
I Am of the Stars

…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
…………………………………………………….
…………………………………………………….

crime, hacking, cloning, Chrome, computer hacking, computer cloning, cybercrime,

The Karma of Hacking . plus House Break-ins; Communications and Transportation and Crime . by Alice B. Clagett

Written and published on 29 July 2017; revised

  • THE KARMA OF HACKING
  • ON THE WILDING OF SECRET SERVICE CYBER SPYWARE
  • THE ‘ONCE REMOVED’ QUALITY OF HOUSE BREAK-INS AND BURGLARIES: ASTRAL STORIES
  • COMMUNICATIONS / TRANSPORTATION AND CRIME: PHONE, INTERNET, AND POST OFFICE
    • Hacking Personal Computers through Phone Lines
    • Astral Rumor: Facebook Hacking and Cloning
    • Has the Drug Industry Gone Postal?
    • Private Helicopter Pads and Drug Transport
    • State Check Points on Interstate Freeways
    • Mass Media, Drugs, and Violence
  • TRACKING OF PERSONAL CARS AND PERSONAL TRAVELS
    • Location Detection of Personal Automobile through ‘Backdoor’ Factory-Installed Software?
    • Smartphone, Cell Phone, and Facebook Location Detection Software
    • The New Clairs and Clearing of Criminal Tendencies from the Astral Body
      • Location Detection Backdoor Software Claims
      • Spy Camera Claims and Their Easy Resolution
  • ON EVALUATING AND ACTING ON ASTRAL STORIES

Dear Ones,

THE KARMA OF HACKING

Times are tough, and many honest people, worldwide, are turning to cyber crime as a way to make ends meet, and to support their families …

It seems that cyber attacks, as with house break-ins, are sourced from our wider circle of friends and acquaintances, including social friends and those we patronize for business.

From my research, I was surprised to find recently, that even long-time friends and acquaintances of folks’ families are not immune from preying on their good friends and relatives, or relatives by marriage, on the pretext that their victims will never know that they are being attacked.

If you and your family are very computer savvy, I beg you to consider the karma of hacking; the karmic results that will manifest in your lives, should you opt to hack.

Consider, for instance …

  • The loss of long-time friendships,
  • The lack of goodwill from the friends and neighbors that might be victims,
  • And the catastrophic results to a family’s legal computer and internet enterprises.

As I understand it, the penalties for hacking and ID theft might be in the range of …

  • $3000 per instance and/or up to 20 years in jail.

How would it be for a family, if one member got a prison sentence? If the penalty were to be financial, how would that affect the family savings account?

Children learn how to interact with the world at their parents’ knee, and by watching what their parents do. How would it be if our children learned to be cyber criminals so as to impress their parents? What future would our children have?

For instance, what if detection of hacking results in a felony conviction? There are restrictions on the liberties of felons, even after they have served time …

  • Felons cannot leave the country.
  • They cannot bear firearms.
  • They cannot serve on juries.

To me, these are very important liberties, the loss of which would be inconceivable. Yet every felon must face their loss.

For those of my readers who are computer savvy: Please take the above into consideration. If you see merit in it, please forward it to your computer savvy friends.

I wish the best for each of you in the coming times.

ON THE WILDING OF SECRET SERVICE CYBER SPYWARE

The astral airs have it that Secret Service cyber spyware worldwide has gone wild, through employees taking software home for personal use, such as to spy on spouses, relatives and friends.

Maybe their less-secure home computers are being hacked by cyber criminals for the software, who then use it for their nefarious undertakings.

Maybe disgruntled ex employees, fired for drug use, are aligning with the drug lords and selling the software as a stopgap till they find employment elsewhere.

Whatever the mode has been, if the astral airs are to be believed, some pretty potent secret service software has gone wild, and is now in the hands of crime families, drug lords, and the mobs and mafias around the world.

What can possibly be done to protect the average Joe and his family from the wiles of these career criminals?

THE ‘ONCE REMOVED’ QUALITY OF HOUSE BREAK-INS AND BURGLARIES: ASTRAL STORIES

With regard to tips to family and friends on house break-ins and burglaries, here are two examples from the clair plane …

  • A woman who has a storefront acupuncture business along with her husband, copies clients’ drivers licenses, which have their addresses on them, when she takes payments. She has an opium addiction, and passes the addresses on to a younger member of her extended family, who specializes in house break-ins. He pays her for the tips on the addresses, and this helps support her opium habit. Because she and her husband are well respected in the community, they are unlikely to fall under suspicion.
  • A young man works for a rental car company as the person who drives clients home after they return their rental cars. He reports to an extended family member on likely looking houses for break-ins. The tips he gives to his burglar family member are not intentional; he wants to keep his job. But both are psychic … as are most people in these days of global telepathy … and the driver cannot keep this information from his burglar friend. Further, because of family bonds, he cannot report the criminal or curtail his activities.

The difficulty here, as telepathy sweeps round the globe, is that people are continuing with crime as usual. Hoping they will get away with it a little longer, despite knowing that an ever-widening circle of acquaintances know what they are doing.

What will happen as these issues of crime amongst neighbors and extended family begin to settle out, is anyone’s guess. I am hoping for a quiet and peaceful transition, insofar as that is possible.

COMMUNICATIONS / TRANSPORTATION AND CRIME: PHONE, INTERNET, AND POST OFFICE

Hacking Personal Computers through Phone Lines

There is an astral rumor that there is a backdoor to people’s phone lines through the online customer service. The rumor goes that it is easy to hack the phone line online passwords, and so gain access to people’s phone messages, and hear or delete them.

There is another rumor that, when people opt for the cable service that combines internet with phone, on one line, crooks can call the phone line, using a randomized phone number, and hack their intended victim’s computers through the phone line back door.

If true, this would allow identity theft, as well as credit card fraud, and it would allow sensitive personal documents to be stolen.

Astral Rumor: Facebook Hacking and Cloning

There is an astral rumor that Facebook has a backdoor to do with cloning folks’ desktops and backing up their hard drives. To avoid this, rumor has it, one must sign off Facebook after each use, and also disable Facebook chat, which is casting up messages on personal computer desktops.

Has the Drug Industry Gone Postal?

The buzz in the astral airs has it that mafia in its various iterations worldwide does its best to place a ringer in post offices, and in the offices of private mail carriers, for nefarious reasons to which they alone are privy. One might hazard a guess that a goal might be postal shipment of drugs and other illegal items.

There is another astral story that crime families are attempting to cut deals with cable carriers to hardwire or software hack personal internets.

Private Helicopter Pads and Drug Transport

Could the astral rumors be true? Are private helicopter pads being used to transport drugs into urban areas? If so, would decriminalization of drugs help with regulation and taxation of the drug industry?

State Check Points on Interstate Freeways

Yet another astral rumor: Are male drug runners at State checkpoints on Interstate freeways disguising themselves as women so as to avoid the typecasting warning signs from popping up with the roadside checkup personnel?

Mass Media, Drugs, and Violence

There is an astral rumor that the themes of the mass media are being financed by mafias worldwide to drum up public support of criminal activities and to cause people to long to take drugs and engage in acts of violence.

Then, there is another astral rumor that the people involved in mass media creation … whether producers, writers, directors, or actors, I have not heard one way or the other … might be involved in drugs and violence and so on, and thus prone to create works of art based on their own experience of life.

Of course, it might also be that many people are already in that space, and longing to take drugs and engage in acts of violence; as I recall, this is closer to the theories proposed by mass media moguls: To wit, that the mass media are a backward looking indicator that creates on the basis of public tastes.

TRACKING OF PERSONAL CARS AND PERSONAL TRAVELS

Location Detection of Personal Automobile through ‘Backdoor’ Factory-Installed Software?

Another astral rumor that I heard in 2016, is to this effect: There is some software purportedly installed in modern, electronic cars, and typically turned on by consumers … could the rumors be referring to Bluetooth or Pandora, I wonder? … that allows crooks to trace the whereabouts of people on the road. The wild astral story had it that the creator of the software, whatever it was, and whoever he was, had relocated to … was it Japan? … and was living the good life there. Maybe this has to do with mapping software in the cars?

Smartphone, Cell Phone, and Facebook Location Detection Software

Then there is a well-breezed-about story, I guess true, to the effect that smartphones and Facebook have location software that, if not disabled, allows a person’s whereabouts to be discovered. I think everyone knows about that, though.

The New Clairs and Clearing of Criminal Tendencies from the Astral Body

Location Detection Backdoor Software Claims. Location detection backdoor software claims are hard to track down, since one of the new clair abilities is to place oneself in someone else’s shoes, and in that way one might figure out someone else’s location. The trouble here comes with insufficient clearing of criminal malware concomitant with the new clair ability manifesting. I expect the Incoming Light will soon provide a fix for that … maybe even during the August 2017 Lion’s Gate.

Spy Camera Claims and Their Easy Resolution. The same is true of astral claims that there are ‘spy cameras’ in personal residences. What this apparently really is, is the new clair ability to ‘put yourself in someone else’s shoes’, combined with as yet uncleared voyeuristic tendencies (peeping tom propensities, for instance) or with the desire to frighten another person, so as to feel less afraid oneself during times of high Light.

So this last item is, in most instances, merely an annoyance. If you have any doubt about it, you can purchase an inexpensive wireless camera RF detector … see https://www.harborfreight.com/wireless-camera-rf-detector-95053.html … from stores such as Harbour Freight, and settle the issue definitively for the sake of the inner child within.

ON EVALUATING AND ACTING ON ASTRAL STORIES

If real life were half as scary as the astral stories, we would all be living in hell, rather than here on Earth. I guess the main thing about the astral stories is: We can take them with a grain of salt, unless evidence pops up that supports them.

Even then, when we have possible evidence in hand, the thing to do is to investigate, on the physical plane. Look folks in the eye … Ask questions.

In most cases, I find that what is actually taking place is a merging of our hellworld scenarios … the landscapes of our unconscious and subconscious fears, angers, and negative touch-points, with the brighter landscape of the conscious mind.

In Timeline terminology, we call this merging denser timelines with the brighter timelines made available to us through the Incoming Light.

What it takes to do the merge is a neutral state of mind. Keep the chest muscles relaxed. Then, as we undergo dharmic action … ‘right action’ … in the physical world, we can transform and merge the negative timelines with the New through the process of Personal Alchemy.

In love, light and joy,
I Am of the Stars

…………………..

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

…………………………………………………….
…………………………………………………….

cyber crime, crime, hacking, identity theft, law enforcement, burglary, house break-ins, worldwide telepathy, personal alchemy, mafia, dharma, acting out, right action, transformation, timeline merge, astral stories, timelines, crime families, crime prevention, electronic devices, disclosure,