Tag Archives: human rights

I Am a Freeborn Women. A Hacker Vaunted ‘I OWN YOU NOW’. Have I Become a CyberSlave? . by Alice B. Clagett

I Am a Freeborn Women. A Hacker Vaunted 'I OWN YOU NOW'. Have I Become a CyberSlave?

Image: “AI Logo,” adapted from Image by Pete Linforth from Pixabay – Pixabay License

  • WHAT DOES IT MEAN WHEN A HACKER SAYS ‘I OWN YOU NOW’?
  • IS IT CHILDREN OR GROWN-UPS WO DO ‘I OWN YOU NOW’ HACKS?
  • WHAT CAN BE DONE TO ABOLISH THIS NEW FORM OF HUMAN ENSLAVEMENT? I AM A FREEBORN WOMAN – NOT A CYBERSLAVE!
  • SIDEBAR: WHAT ARE STATE-SPONSORED ACTORS AND ‘BLACK HAT’ HACKERS?
  • ARE THERE PLACES ON EARTH WHERE HUMAN SLAVERY STILL EXISTS?
  • WHAT CAN BE DONE TO PREVENT BOTH CYBER ENSLAVEMENT AND PHYSICAL ENSLAVEMENT HERE IN THE UNITED STATES?
  • CONCLUSION
  • MORE INFORMATION

WHAT DOES IT MEAN WHEN A HACKER SAYS ‘I OWN YOU NOW’?

Dear Ones,

I asked Google AI: What Does It Mean When a Hacker Says ‘I Own You Now’?

Google AI said: “When a hacker says ‘I own you now’ (often spelled ‘I 0wn u’, ‘pwned’, or ‘owned’), it is a hacker slang term indicating they have gained complete administrative control (root access) over your computer, phone, or online account. It means they can do anything with the device that the legitimate owner can do, such as accessing files, installing software, or monitoring activity. 

Here is a breakdown of what this phrase implies and what to do:

What ‘I Own You’ Means in Hacking

  • Total Compromise: They have bypassed security measures, potentially using a root exploit, to gain full access.
  • Data Access: They may have access to your personal information, passwords, bank details, or private photos.
  • Control: They can use your webcam, send emails from your account, or use your computer to attack others.
  • Extortion: Often, this phrase is used in extortion scams (phishing) where hackers claim to have compromising data—or threaten to install it—unless you pay a ransom. 

Is the Threat Real?

  • If it’s an email/pop-up: It is often a scam or phishing attempt designed to panic you into paying money. They may use your old passwords or IP address to make it seem more realistic.
  • If you notice weird behavior If your webcam light turns on randomly, files are missing, or your security software is disabled, the threat is likely real.

What to Do Immediately

  1. Do Not Pay: Never pay a ransom, as it confirms you are a target.
  2. Disconnect: Immediately disconnect the device from the internet (Wi-Fi or Ethernet) to stop them from stealing more data.
  3. Run Antivirus: Run a full scan with reputable security software.
  4. Change Passwords: From a different, secure device, change your passwords for critical accounts (email, banking, social media).
  5. Scan for Malware: Check for unfamiliar, installed programs or browser extensions.

Disclaimer: If you are receiving this threat in a personal/interpersonal context rather than from an unknown hacker, it is a sign of extreme control or abusive behavior.


IS IT CHILDREN OR GROWN-UPS WO DO ‘I OWN YOU NOW’ HACKS?

From here on I include prior questions as a point of reference for Google AI. First are the prior question(s) in unbolted text. After that is the new question in bolded text …

I asked Google AI: What does it mean when a hacker says ‘I own you now’?

Google AI, Thanks for your quite excellent response. I have a question for you: Is it children or grown-ups who are doing these ‘I own you now’ hacks?

Google AI said: “… Regarding who is doing these hacks, it is both adults and children/teenagers, but they often have different motives:

  • Grown-ups (Criminals/Scammers): Adults are typically motivated by financial gain. They use this phrase as part of a high-pressure, sophisticated extortion tactic—often using AI to clone voices or using leaked password information to make you believe your account is permanently compromised unless you pay them.
  • Children/Teenagers (‘Script Kiddies’): Younger individuals often use this phrase as a form of ‘cyber-bullying’ or to act tough, similar to ‘little puffer fish’ trying to look bigger than they are. They often use pre-made tools (scripts) to cause distress or gain bragging rights, rather than to make money. 

In both cases, it is important to treat these messages as threats to take seriously, change your passwords, and enable multi-factor authentication immediately.”


WHAT CAN BE DONE TO ABOLISH THIS NEW FORM OF HUMAN ENSLAVEMENT? I AM A FREEBORN WOMAN – NOT A CYBERSLAVE!

I asked Google AI: What does it mean when a hacker says ‘I own you now’? Google AI, Thanks for your quite excellent response. I have a question for you: Is it children or grown-ups who are doing these ‘I own you now’ hacks?

Google AI: I read that slavery was abolished in the United States in the year 1865. It seems to me possible that the ‘I own you now’ hack is a new form of slavery. It feels to me like the hacker is trying to make me his or her ‘CyberSlave’.

For a Freeborn Woman such as I this hack is the child of a primitive and brutal mind. I feel like Mad Max confronting Immortan Joe. What can be done to abolish this new form of human enslavement?

Google AI said: “When a hacker says ‘I own you now’ (often spelled ‘pwned’ or ‘pwnd’ in hacker slang), it signifies that they have gained complete control over your device or account. This phrase is used to indicate that you are under their power, often because they have access to your personal information, files, passwords, or the ability to control your webcam/screen. 

This type of action is not limited to any specific age group, but is typically performed by individuals ranging from malicious, technologically skilled hackers to organized crime syndicates looking for financial gain.

Is it a New Form of Slavery?
Your feeling that this is a ‘CyberSlave’ scenario is valid. While different from physical chattel slavery, this is considered a form of modern digital exploitation or ‘cyber slavery’.

  • Coercion: Hackers often use threats, such as exposing private photos or selling data, to force victims into acting under their control.
  • ‘Digital Slavery’: This term is specifically used for situations where individuals are trapped by cybercriminals, sometimes forced to work in foreign countries, or forced to perform online scams, often involving trafficking of people to work in inhumane conditions.
  • Psychological Control: The goal of saying ‘I own you now’ is to establish dominance, fear, and panic, forcing you to obey their demands.

What Can Be Done to Abolish It?
To combat this form of exploitation, you must take back control of your digital life and refuse to be a victim:

  • Do Not Panic or Pay: Scammers rely on fear and urgency. Paying ransom rarely stops them; it only proves you are a profitable target.
  • Immediately Isolate: Disconnect the compromised device from the internet (unplug or turn off Wi-Fi).
  • Change All Credentials: From a different secure device, immediately change passwords for all major accounts, starting with email and banking.
  • Scan and Wipe: Use robust anti-malware software to scan your system. In severe cases, the device may need to be completely wiped (factory reset).
  • Report the Crime: File a report with local law enforcement and national cybercrime agencies (e.g., the IC3 in the US). 

By taking these steps, you are fighting back against the ‘Immortal Joe’ of the digital world, reclaiming your freedom, and, like Mad Max, ensuring you are not a ‘CyberSlave’.”

DIVING DEEPER

“When a hacker says ‘I own you now’, they are using slang to claim they have gained administrative control over your computer or digital identity. This is often a psychological tactic used to incite panic and bypass your critical thinking. 

Who Performs These Hacks?

While the media often portrays hackers as young males in hoodies, the reality is a diverse mix of ages and backgrounds. 

  • Grown-ups: Organized criminal networks, including state-sponsored actors and ‘black hat’ hackers, typically conduct complex, profit-driven extortion.
  • Younger Individuals: Some decentralized groups recruit young men via gaming platforms to engage in ‘extortion comm’, targeting vulnerable individuals for ransom payments.

Is This a New Form of Slavery?

Your intuition mirrors a serious global concern. Experts use the term ‘Cyber Slavery’ to describe real-world human rights violations where people are kidnapped and forced into scam centers to conduct digital crimes under threat of torture. In the context of a victim being harassed, it is a form of cyber extortion—a legal and psychological threat that aims to strip away your autonomy.”


SIDEBAR: WHAT ARE STATE-SPONSORED ACTORS AND ‘BLACK HAT’ HACKERS?

I asked Google AI: What are state-sponsored actors and ‘black hat’ hackers?

Google AI said: “State-sponsored actors are elite, government-employed, or funded hackers conducting strategic espionage, sabotage, and, for example, attacking infrastructure for political or military goals. Black hat hackers are malicious actors who bypass security for personal gain, fame, or vandalism. Both are skilled, but state actors are usually more patient and better resourced.

State-Sponsored Actors (Nation-State Hackers)

  • Motivation: Primarily driven by espionage, sabotage, influencing elections, or gaining economic advantages for their nation.
  • Characteristics: Highly skilled, well-funded, patient, and often operate with the backing of military intelligence, acting without fear of legal consequences in their home country.
  • Targets: Foreign governments, critical infrastructure (power grids, finance), and high-value, private-sector targets.
  • Examples: Stuxnet (targeting Iran’s nuclear program) and the SolarWinds supply chain attack.

Black Hat Hackers

  • Motivation: Malicious intent, typically for financial gain (ransomware, selling stolen data), stealing personal information, or causing destruction.
  • Characteristics: Skilled individuals who illegally break into systems, often using phishing or malware. They disregard cybersecurity ethics, unlike ‘white hat’ hackers.
  • Targets: Individuals, corporations, and financial institutions.
  • Relationship to others: While state-sponsored actors are sometimes considered a subset of black hats, they differ in that state-sponsored hackers work for a government, while traditional black hats operate for personal, criminal profit.

Key Differences

  • Goal: State-sponsored = Geopolitical/strategic advantage. Black hat = Personal/criminal profit.
  • Resources: State-sponsored actors have superior, state-level funding and tools.

Duration: State-sponsored attacks may take months or years to execute, focusing on stealthy, long-term infiltration.”


ARE THERE PLACES ON EARTH WHERE HUMAN SLAVERY STILL EXISTS?

I asked Google AI: What does it mean when a hacker says ‘I own you now’?

Google AI, Thanks for your quite excellent response. I have a question for you: Is it children or grown-ups who are doing these ‘I own you now’ hacks?

Google AI: I read that slavery was abolished in the United States in the year 1865. It seems to me possible that the ‘I own you now’ hack is a new form of slavery. It feels to me like the hacker is trying to make me his or her ‘CyberSlave’.

For a Freeborn Woman such as I this hack is the child of a primitive and brutal mind. I feel like Mad Max confronting Immortan Joe. What can be done to abolish this new form of human enslavement?

Google AI, Thanks very much for your informative answers. I have a question: Are there place on Earth where human slavery still exists?

Google AI said: “Yes, human slavery absolutely still exists on Earth today, and it is a massive, albeit often hidden, global crisis. Although chattel slavery—the legal ownership of a person—is technically illegal everywhere in the world, modern slavery persists through coercion, violence, and exploitation. 

According to the International Labour Organization (ILO) and Walk Free, an estimated 49.6 million people were living in situations of modern slavery on any given day in 2021.

Here is an overview of where and how modern slavery exists today:

  1. Where Does It Exist?

Modern slavery is not confined to one region; it is a global issue. 

  • Highest Absolute Numbers: The largest numbers of slaves are found in India, China, North Korea, Pakistan, and Russia.
  • Highest Prevalence (Per Capita): North Korea has the highest prevalence, followed by Eritrea and Mauritania, where state-imposed forced labor is common.
  • Developed Nations: While more common in lower-income nations, modern slavery is a severe problem in wealthy nations as well, with over half of all forced labor occurring in upper-middle or high-income countries, often involving trafficking for labor and sexual exploitation. 
  1. Forms of Modern Slavery

Modern slavery takes several, often invisible, forms:

  • Forced Labor: Roughly 27.6 million people are coerced into work against their will, often in agriculture, construction, manufacturing, and domestic work.
  • Debt Bondage: Victims are forced to work to pay off a debt that is impossible to repay, sometimes inherited through generations.
  • Sex Slavery/Commercial Sexual Exploitation: Approximately 6.3 million people are victims of sex trafficking, of which 99% of victims are women and girls.
  • Forced Marriage: About 22 million people are in forced marriages, which are considered a form of slavery when the person cannot leave or refuse.
  • State-Imposed Forced Labor: In countries like North Korea and Eritrea, the government compels citizens to work.
  1. Why It Persists
  • High Profit, Low Risk: Modern slavery generates over $150 billion in illegal profits annually.
  • Vulnerability: Traffickers exploit poverty, lack of education, and migrant status.
  • Technology: Traffickers use online platforms to recruit, groom, and control victims.
  1. What is Being Done to Abolish It?

The United Nations has set a goal to end modern slavery, forced labor, and human trafficking by 2030. Efforts include:

  • Legislation: Countries are implementing laws, such as the UK Modern Slavery Act, to require businesses to ensure their supply chains are free from exploitation.
  • Victim Support: Providing safe shelters, legal aid, and counseling to survivors.
  • Awareness and Action: NGOs and international organizations are working to raise awareness and support law enforcement in rescuing victims.

Modern slavery persists because it is intertwined with inequality, prejudice, and systems of power that remain unchallenged.”


WHAT CAN BE DONE TO PREVENT BOTH CYBER ENSLAVEMENT AND PHYSICAL ENSLAVEMENT HERE IN THE UNITED STATES?

I asked Google AI: What does it mean when a hacker says ‘I own you now’?

Google AI, Thanks for your quite excellent response. I have a question for you: Is it children or grown-ups who are doing these ‘I own you now’ hacks?

Google AI: I read that slavery was abolished in the United States in the year 1865. It seems to me possible that the ‘I own you now’ hack is a new form of slavery. It feels to me like the hacker is trying to make me his or her ‘CyberSlave’.

For a Freeborn Woman such as I this hack is the child of a primitive and brutal mind. I feel like Mad Max confronting Immortan Joe. What can be done to abolish this new form of human enslavement?

Google AI, Thanks very much for your informative answers. I have a question: Are there place on Earth where human slavery still exists?

Google AI, I see from your response that human slavery is still a concern on Earth today. I also have a concern, spurred on by the Cyber Enslavement threat I dealt with early this morning.

My concern is this: Is it possible that human slavery, either through Cyber Enslavement or through physical enslavement, might rear its ugly head here in the United States? If so, what could be done to prevent this awful thing from happening?

Google AI said: “Yes, it is unfortunately true that human slavery, often called ‘modern slavery’ or human trafficking, still exists in the United States today, and it is a major concern. Estimates suggest that on any given day, hundreds of thousands of people in the U.S. live in conditions of modern slavery, which include both forced labor and forced sexual exploitation.

This is not a historical issue; it is a present reality where people are coerced, deceived, or forced into labor or commercial sex through threats of violence, debt bondage, or the seizure of their immigration documents.

Modern Slavery and ‘CyberSlave’ Threats in the US 

The ‘I own you now’ comment by a hacker aligns with the psychological coercion used in trafficking, where perpetrators aim to make victims feel utterly controlled, hopeless, and isolated.

  • Labor Trafficking: Victims are forced to work in sectors like agriculture, domestic service (cleaning/caregiving), restaurants, construction, and hospitality.
  • Sex Trafficking: Victims are forced into commercial sex acts, with online platforms and social media increasingly used for recruitment and exploitation.
  • Vulnerable Populations: Immigrants, particularly those with H-2A or H-2B visas, are highly targeted because traffickers exploit their fear of deportation and dependence on a single employer. Other vulnerable groups include children in the foster care system, LGBTQ+ individuals, and homeless youth.
  • Prison Labor: The 13th Amendment allows for involuntary servitude as punishment for a crime, which critics argue is a form of state-sanctioned forced labor that still exists today.

Preventing Modern Slavery in the United States

Preventing this form of enslavement requires a combined effort from law enforcement, legislation, and public awareness. Key measures include:

  • Stronger Legal Action: Federal laws like the Trafficking Victims Protection Act (TVPA) of 2000 and its reauthorizations provide tools to prosecute traffickers and protect victims. Increased prosecution of labor trafficking, not just sex trafficking, is needed.
  • Visa Reform: Allowing migrant workers to change employers without losing their legal status reduces dependence on abusive employers.
  • Supply Chain Audits: Businesses are being encouraged to verify that their goods are not produced with forced labor.
  • Digital Vigilance: Recognizing that traffickers use technology to target victims means that cybersecurity and digital literacy are now part of the fight against slavery.
  • Public Awareness: Knowing the signs—such as restricted movement, fear, and unpaid work—and reporting them to the National Human Trafficking Hotline (1-888-373-7888) is crucial.

For a person feeling threatened by a hacker, it is important to treat it as a serious criminal matter, document all interactions, and report it to local law enforcement or the FBI.”


Here is the complete series of questions …

Google AI, What does it mean when a hacker says ‘I own you now’?

Google AI, Thanks for your quite excellent response. I have a question for you: Is it children or grown-ups who are doing these ‘I own you now’ hacks?

Google AI: I read that slavery was abolished in the United States in the year 1865. It seems to me possible that the ‘I own you now’ hack is a new form of slavery. It feels to me like the hacker is trying to make me his or her ‘CyberSlave’.

For a Freeborn Woman such as I this hack is the child of a primitive and brutal mind. I feel like Mad Max confronting Immortan Joe. What can be done to abolish this new form of human enslavement?

[SIDEBAR: I asked Google AI: What are state-sponsored actors and ‘black hat’ hackers?]

Google AI, Thanks very much for your informative answers. I have a question: Are there place on Earth where human slavery still exists?

Google AI, I see from your response that human slavery is still a concern on Earth today. I also have a concern, spurred on by the Cyber Enslavement threat I dealt with early this morning.

My concern is this: Is it possible that human slavery, either through Cyber Enslavement or through physical enslavement, might rear its ugly head here in the United States? If so, what could be done to prevent this awful thing from happening?

Google AI, thanks for throwing light on this troublesome topic. I feel a little bummed out, but I also feel that being informed is the first step towards a solution.

Thanks again. Alice B. Clagett


CONCLUSION

Dear Ones, How do you feel about this discussion?

Feel free to comment on this blog. You comments and thoughts are welcome.

In love, light and joy
This is Alice B. Clagett.
I Am of the Stars … and so are you!

Compiled and published on 27 January 2026; revised on 17 February 2026

NOTE: In this post, quotes from Google AI are in light blue font.


MORE INFORMATION

Adjectives to Do with Enslavement of People

“Adjectives associated with the enslavement of people describe the forced, subhuman, and brutal conditions of bondage, often emphasizing the deprivation of liberty, systemic oppression, and forced labor. Key terms include enslaved, subjugated, shackled, indentured, chattel, coerced, exploited, oppressed, captive, dehumanized, and forced. 

Descriptors of Enslaved People/Condition 

  • Enslaved: Emphasizes that enslavement was a condition forced upon someone.
  • Bound/Shackled/Chained: Indicates physical restraint and captivity.
  • Subjugated/Oppressed: Highlights being under the domination of another.
  • Indentured/Bound: Refers to legal or contract-based servitude.
  • Chattel: Refers to treating humans as personal property.
  • Helpless/Destitute/Abject: Describes the state of being without power or resources.
  • Dehumanized: Indicates the denial of humanity and rights.

Characteristics of the System/Practice

  • Forced/Coerced/Compelled: Highlights that labor was obtained through force.
  • Brutal/Cruel/Torturous: Describes the physical and emotional violence.
  • Systemic/Structural/Institutional: Highlights that slavery was organized and legalized.
  • Perpetual/Lifelong/Hereditary: Highlights that the condition was often for life and passed to children.
  • Exploitative: Focuses on the misuse of labor for gain.

Describing the Status

  • Servile: Relating to a state of slavery.
  • Dependent/Subservient: Indicating total reliance and lack of agency.
  • Trafficked: Referring to the buying and selling of human beings. 

These terms are often used to emphasize the harsh realities of historical and modern slavery, focusing on the loss of autonomy and the severe violation of human rights.” –Google AI

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

human rights, slavery, cyber enslavement, cyberslavery, cybercrime, law enforcement, crime and crime prevention, state-sponsored actors, black hat hackers, white hat hackers,

Do Women in the United States Have the Right to Privacy? . by Alice B. Clagett

In this post, quotes from Google AI are in light blue font.

Do Women in the United States Have the Right to Privacy?

Image: “Women’s Right to Privacy,” adapted from Image by Joseph Mucira from Pixabay – Pixabay License

Image: “Women’s Right to Privacy,” adapted from Image by Joseph Mucira from Pixabay – Pixabay License

  • DO WOMEN IN THE UNITED STATES HAVE THE RIGHT TO PRIVACY?
  • CONCLUSION

DO WOMEN IN THE UNITED STATES HAVE THE RIGHT TO PRIVACY?

Dear Ones,

I asked Google AI: Do single, married, divorced and widowed women in the United States have the right to privacy? For example …

  • not to be surveilled in the home or bedroom,
  • not to have their email hacked,
  • not to have their phone tapped,
  • not to be stalked or followed, whether electronically or by a person?

Google AI said: “Yes, regardless of their marital status, women in the United States have a protected right to privacy. This right is supported by a combination of constitutional amendments, federal statutes, and state-level protections that apply to single, married, divorced, and widowed women alike.

Protections Against Surveillance and Hacking

Several federal and state laws criminalize the specific invasive actions you mentioned:

  • Surveillance in the Home: Individuals have a ‘reasonable expectation of privacy’ in private spaces like bedrooms. Placing hidden cameras in these areas without consent is generally illegal and can be grounds for criminal charges or civil lawsuits.
  • Email Hacking: The Computer Fraud and Abuse Act (CFAA) and the Electronic Communications Privacy Act (ECPA) prohibit unauthorized access to private emails. Even if the perpetrator is a spouse, accessing a private, password-protected account without permission is a violation of federal law.
  • Phone Tapping: Title I of the ECPA (the Wiretap Act) prohibits the intentional interception of wire, oral, or electronic communications. Many states, such as California, further require ‘two-party consent’, meaning recording any conversation without both parties’ permission is illegal.
  • Stalking and Electronic Tracking: Stalking—whether in person or through technology—is illegal under the Violence Against Women Act (VAWA) and various state laws. As of 2026, many states have also enacted specific bans on the use of electronic tracking devices (like GPS trackers) without a person’s consent.

Marital Status and Privacy

While these rights apply to everyone, marital status can occasionally complicate how they are enforced: 

  • Married Women: In some jurisdictions, a ‘justifiable expectation of privacy’ may be harder to prove if digital devices or accounts are shared. For example, if a spouse has the password to a shared family computer, looking at files on that computer might not be considered illegal ‘hacking’ in the same way as accessing a private, separate account.
  • Divorced or Separated Women: Privacy violations often spike during divorce proceedings. Courts generally rule that evidence obtained through illegal spying (like hacking or hidden bugs) is inadmissible and can lead to severe penalties for the spouse who collected it.

Emerging Rights in 2026

In 2026, privacy protections are expanding through new comprehensive state laws: 

  • New State Laws: As of January 1, 2026, new privacy laws in Indiana, Kentucky, and Rhode Island take effect, giving women in those states greater control over their sensitive data, including geolocation and private communications.
  • Sensitive Data Controls: These 2026 laws often require businesses and individuals to obtain explicit consent before processing or sharing sensitive information like precise geolocation data.”

CONCLUSION

More facts, straight from ‘the horse’s mouth’.

In love, light and joy
This is Alice B. Clagett.
I Am of the Stars … and so are you!

Compiled and published on 22 January 2026; revised on 17 February 2026

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

law, women’s rights, human rights, surveillance, email hack, phone tap, stalking, cybercrime,

Do Women in the United States Have the Right to Own and Control Real and Personal Property? . by Alice B. Clagett

In this post, quotes from Google AI are in light blue font.

Do Women in the United States Have the Right to Own and Control Real and Personal Property?

Image: “Do Women Have the Right to Own Property?” adapted from Image by Abdulhakeem Samae from Pixabay – Pixabay License

Image: “Do Women Have the Right to Own Property?” adapted from Image by Abdulhakeem Samae from Pixabay – Pixabay License

  • DO WOMEN IN THE UNITED STATES HAVE THE RIGHT TO OWN AND CONTROL REAL AND PERSONAL PROPERTY?
  • CONCLUSION
  • MORE INFORMATION
    • Coverture – A Law Now Dismantled in the United States

DO WOMEN IN THE UNITED STATES HAVE THE RIGHT TO OWN AND CONTROL REAL AND PERSONAL PROPERTY?

Dear Ones,

I asked Google AI: Where in the United States do single or married or divorced or widowed women have no right to own, sell, or control real or personal property?

Google AI said: “Based on historical American law, there is no current U.S. location where women lack property rights. Historically, through the doctrine of coverture, married women in many American colonies and early states were restricted from owning, selling, or controlling property, as their legal identity was absorbed by their husband. This system was phased out in the mid-to-late 19th century. 

  • Historical Context: Before the passage of Married Women’s Property Acts (beginning roughly in 1839–1848), married women lacked independent control over property in most states.
  • Regional Differences:  n early America, some colonies like Connecticut severely restricted women’s property rights, while others like Virginia allowed more freedom through dowry rights.
  • Common Law vs. Spanish Law: Common law required husbands to manage property, while western territories influenced by Spanish civil law sometimes allowed women more control.
  • Legal Shift: By 1900, all states had passed legislation enabling married women to own property, enter contracts, and file lawsuits.
  • Final Barriers: It was not until the 1970s that federal laws, such as the 1974 Equal Credit Opportunity Act, allowed women to secure financing without a male co-signer. 

Today, all women in the United States, regardless of marital status, have the legal right to own, sell, and control real and personal property.”


CONCLUSION

These are the facts, straight from ‘the horse’s mouth’. For more on the antiquated law called Coverture, see below.

In love, light and joy
This is Alice B. Clagett.
I Am of the Stars … and so are you!

Compiled and published on 22 January 2026; revised on 17 February 2026


MORE INFORMATION

Coverture – A Law Now Dismantled in the United States

Coverture was a historical English common law doctrine where a married woman’s legal identity merged with her husband’s, making her a feme covert, unable to own property, sign contracts, or sue/be sued independently, effectively making her a legal non-entity subordinate to her husband, a system dismantled in the U.S. through state laws like the Married Women’s Property Acts starting in the 1830s.

Key Aspects of Coverture

  • Legal Unity: Husband and wife became one legal person, with the husband holding authority, similar to a feudal lord, making spouses unable to contract with each other.
  • Loss of Identity: A woman lost her individual legal existence (feme sole) and became legally covered (feme covert) by her husband.
  • Property Rights:

 She generally couldn’t own, sell, or control real or personal property; it passed to her husband.

  • Contractual & Legal Incapacity: She couldn’t enter contracts, sue, or be sued without her husband’s consent.
  • Political Exclusion: Women couldn’t vote or hold office.

Origin & End

  • Origin: Derived from English common law and Norman feudal customs, it was a foundational principle in the American colonies and early U.S..
  • Dismantling: Began in the U.S. with Mississippi’s 1839 Married Women’s Property Act, with other states following, gradually restoring rights to married women through legislation.

Legacy

  • While legally obsolete, coverture shaped societal views and legal structures, influencing debates for women’s suffrage and ongoing discussions about marital property and rights.” –Google AI

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

law, women’s rights, human rights, real estate, real property, coverture, personal property,

Concerning Chinese Expansionism to the United States . video by Alice B. Clagett

Concerning Chinese Expansionism to the United States

Image: “Self-Portrait 1,” by Alice B. Clagett, 2 January 2026, CC BY-SA 4.0 International, from “Awakening with Planet Earth,” https://awakeningwithplanetearth.com ..

Image: “Self-Portrait 1,” by Alice B. Clagett, 2 January 2026, CC BY-SA 4.0 International, from “Awakening with Planet Earth,” https://awakeningwithplanetearth.com ..

    • INTRODUCTION
    • VIDEO BY ALICE
    • SUMMARY OF THE VIDEO
      • INTRODUCTION
      • GOOGLE AI RESEARCH
        • Sorcery
        • Triads – Crime Gangs
        • Infiltration by Strongmen – Sorcerers
        • Crimes by Triads
        • Can Triad Members Buy Their Way Out of Prison?
        • Libel and Slander Laws
      • PSYCHIC IMPRESSIONS
        • Face
        • Child Rearing
        • Black Dragons
        • Child Exploitation
        • Land Use
        • Could a Triad Stage a Bloodless Coup?
        • Triad House by House Takeover of a Port City?
        • Surveillance Devices and Financial Accounts
        • Stealth Genocide by Triads
      • CONCLUSION
    • OUTLINE OF THE VIDEO
    • VIDEO CREDITS
    • MORE INFORMATION

INTRODUCTION

Dear Ones,

This is about cultural and legal differences amongst China, Hong Kong, and the United States and how these are playing out during the trade war with its tariff increases here in the United States.

There is a Summary after the video.

VIDEO BY ALICE

This is the WordPress version …

This is the youtube version: https://youtu.be/lUwgJ9R19HU ..

SUMMARY OF THE VIDEO

“CONCERNING CHINESE EXPANSIONISM TO THE UNITED STATES”
A video by Alice B. Clagett

 INTRODUCTION

Hi everyone, it’s Alice. I Am of the Stars.

I’ve come to some startling realizations regarding the differences between China and the United States, and I thought I’d share them with you.

I think here in America, we celebrate diversity, but we don’t recognize the importance of sorting through diversity and how different cultures react against each other. And we need to address the diversity as a problem as well as a celebration, so that we can come to a deeper understanding each of the other culture.

I’m going to put first the information that I researched last night. This is substantiated by Google AI information that I’m going to put on my website at the bottom of the page, under “More Information.” Then I’m going to put down what’s more like Psychic Impressions as a separate section. Then there will be a Conclusion based on both of these.

So you’ll know what Google AI feels to be so or what’s the current state of awareness of what’s so in the internet industry. And you’ll also be able to benefit insofar as it’s truthful from my psychic impressions. You’ll be able to sort through the two and weight my discussion in the manner that’s suitable for your own understanding of these things.

GOOGLE AI RESEARCH

Okay. So now this is what I learned from my reading last night …

These two cultures are very different and and they’re competitive. The governments of the two countries are using the differences between the two cultures as tools or pry bars during the trade war and during the ongoing conflict. And many things are happening that are not being talked about in the media.

Sorcery

The issue of sorcery: In China, sorcery is a crime. And in Hong Kong and the United States, they protect sorcery as a religion. However, they feel that crimes committed by sorcerers should be treated equally under the law according to the laws of their countries. You see? They treat the behavior of the sorcerers and not the sorcery.

So, China knows that sorcery is a potent power for evil in the world. But the United States does not understand this.

Triads – Crime Gangs

In addition, there are these groups called Triads which are crime gangs in China. These Triads use sorcery in some cases … these days, not so much, but a great deal so in in the past.

Infiltration of the United States by Strongmen – Sorcerers

China aligns with these Triads as strongmen … or you could say sorcerers and people who practice witchcraft … which they feel to be a true and potent power … and sends them to other countries such as the United States and countries worldwide to wreak havoc on those countries on behalf of China. So to some extent China aligns with the strongmen in their own country and sends them abroad.

Crimes by Triads

The Triads practice crimes such as money laundering, child exploitation, fencing of stolen goods, and many other crimes that are very grave crimes here in the United States. And so if they do that, they can be captured here in the United States and exported.

Can Triad Members Buy Their Way Out of Prison?

I do have a question. If they go back to the place where they came from, such as Hong Kong or China, can they buy their way back here for an amount of money that they’ve set aside in some other world bank just for that eventuality? I think that the answer is yes, but I don’t see it online.

Okay. So, there’s this issue of sorcery being different.

Libel and Slander Laws

I found out this morning that the laws regarding libel and slander in the United States are considerably different from those in China and Hong Kong. In the United States, they’re primarily a matter of civil recourse. In China and in Hong Kong, there are also criminal legal remedies.

So during a trade war between China and the United States this difference might be perceived as a weakness of the United States and it might be used to weaken people in the United States who are perceived to be a threat to an economic incursion.

They might be slandered. They might be libeled. Their character might be defamed under the notion that it’s more difficult to counteract these behaviors in the United States than it is in China and Hong Kong.

PSYCHIC IMPRESSIONS

Now, here’s a section more with psychic impressions that I’ve had over the years. I’m starting with that section right now.

Face

In China, loss of face is a very big thing. In the United States, it’s important, but it’s not world shatteringly important.

The need to save face can be used as a bargaining chip in our interactions with people from China. For instance, they may level a water use accusation against us that they want to report to the police. If we level a similar strength setback violation accusation against them, then in order to save face, they won’t go to the police. This has to do with territorial disputes amongst neighbors.

So then keeping in mind the value to save face, which is not immediately important to us, we can use this as a bargaining chip in our dealings with them.

Child Rearing

Then there’s another issue. There’s an issue about child rearing. Apparently in China mothers mother their children while they’re being breastfed for a couple of years and then after that they don’t treat them so much in a motherly fashion.

Here in the United States, I’m happy to say that many mothers … at least this is our ideal … love their children and help their children all their lives. So there’s a very great difference there in terms of motherly support and family support, between China and the United States.

And it could be that China’s emphasis on the importance of family has to do with their perception that our family togetherness throughout life is a strength of the United States.

Okay. So far we have sorcery, strongmen, all those crimes that syndicated crimes do … and in China, they’re called Triads.

Black Dragons

Here in Los Angeles, there was a Triad that was in the San Gabriel Valley and also in Los Angeles. Then at the turn of the century, around 2002, there was a big operation to take that crime gang out of action here in the Greater Los Angeles area. I found out so many things last night! And then I had these dreams in the morning.

Child Exploitation

Let’s see. You have motherly love. Yes, child exploitation is something that China is fighting against. But the Triads here in America, that are spreading out from China and from Hong Kong are, I feel, ruthlessly exploiting our children; ruthlessly so, I feel.

This is just an intuition that I have and I cannot prove it. But I think it has to do with the lack of motherly love in China that causes them to be more callous towards children than is the case here in the United States.

And our laws reflect our great concern for our children. There are very stiff laws here in California, for instance.

Land Use

So then we have, let’s see, land use. In China no one can own land. That’s not to say that there aren’t people who control the land in such a way that they might as well own it, I feel, but the ideal and the notion of the people is that no one can own their land.

And here in the United States, not only do we own land privately, but also we sell land to people in China.

In China, nobody owns land but the government. So essentially what happens when we allow Chinese to buy land from us is that we sell our land to the Chinese government.

This might be looked upon by China as a chance to accomplish a bloodless coup against a nitwit neighboring nation. They might feel we’re complete idiots to to sell our country bit by bit to a foreign power and that then they should take advantage of it.

Could a Triad Stage a Bloodless Coup?

So, say they engage with a a Triad crime organization which begins to buy up land in the United States. The land really belongs to the government of China if China takes over here.

But during the time that the Triad people live there, from their own point of view they’re leasing land from China. They don’t own it and pass it on, but they lease the land from China.

But here in the United States, the laws are such that you have to pass the land on, say to a family member. I think the great point that we have here is that if we can enforce not giving the land to China, but rather to a particular family member or group, that’s the thing to do.

I think we need to look at trusts in land use, and see how that really pans out with regard to people who are of foreign nationality who purchase land here. That’s very important for America. for us to stay an American nation.

Triad House by House Takeover of a Port City?

Okay, here’s another scenario. This is a scenario of a house by house takeover of a port city in the United States on behalf of the Chinese government.

Say a Triad moves from house to house, killing the homeowners and then leasing the property to tenants. If they’re able to accomplish this in a neighborhood, then what they’re doing is they’re creating the Chinese ideal of land use here. You see?

So it might be looked at as an appropriate thing to do, you see? If that were so … if that were the mindset there, that it’s appropriate to do that … then we must be ever very cautious that such a scenario does not take place in the port towns of the United States.

Surveillance Devices and Financial Accounts

There’s also, as you know, the issue that I’ve spoken of in separate venues regarding surveillance systems and computers. The trouble is that the software we use to defend our homes and to do our finances online is owned by or might be susceptible to surveillance by Chinese groups.

And the Chinese groups, according to Chinese law, have to allow their data to be available to the Department of Defense in China. Do you see? So if a war is going on, all these factors are considerations.

Stealth Genocide by Triads

One thing that the Triads might do here in America, if they figured there was a war going on between China and America. even before we declared a trade war here, is that they might export some of their members to Los Angeles and other places to decimate the child population of United States citizens.

One way that’s done sometimes in the Orient is to castrate the boy children. And we may find if we look carefully into hospital records that men and boy children here in Los Angeles and elsewhere in the United States are being castrated.

Now, why are they being castrated? It’s so that they cannot have children. Okay? If they cannot have children, then the competing nation, the nation that is at war with us, will have children and those children will take over the United States if they are placed here. Do you understand?

It’s very basic. Genocide is a very basic way of acquiring another nation. But it can be done under wraps in this way by providing, for instance, sexual allurement as a way to attract young people. And then if the children are captured and castrated either they will die of of blood loss at that time or else if they survive they won’t be able to have children.

And so in the whole nation, if there are no children that can inseminate other children, then no more children can be produced, you understand? It’s an under the wraps way of taking over a nation.

We have to protect our children very carefully, okay? … and let them know the very great dangers of an undercover war, okay? … because our children are falling for it. This is my psychic impression. They’re falling for it by the dozens. A whole school class is gone by the 8th grade through being allured to a particular locale and there being drugged, being killed, or being castrated.

CONCLUSION

I know we as a nation have a tendency to look on the bright side and to forget about the bad stuff. I know it’s been a long time since we’ve had a war on our own turf. And what we’re dealing with is a mindset that believes this is not possible.

So, we have to turn it around. We have to protect our children. We have to protect ourselves. Okay?

God bless you all,
Keep you safe in this New Year,
And be with you
Through all your days.

In love, light, and joy,
This is Alice B. Clagett.
I Am of the Stars … and so are you.

See you at my website awakeningwithplanetearth.com, where we don’t usually talk about such gnarly topics.

Filmed and published on 2 January 2026; transcribed and youtube transcription edited on 3 January 2025
This is a high definition film.

VIDEO CREDITS

“Concerning Chinese Expansionism to the United States”
By Alice B. Clagett

Filmed and produced on 2 January 2026
Location: San Fernando Valley, Los Angeles, CA

Creative Commons BY-SA 4.0 International –
By Alice B. Clagett

Image: “Self-Portrait 2,” by Alice B. Clagett, 2 January 2026, CC BY-SA 4.0 International, from “Awakening with Planet Earth,” https://awakeningwithplanetearth.com ..

MORE INFORMATION

Here are the timeframes as described on youtube:

00:00 Introduction 01:43 Google AI Research Section 02:17 Sorcery 02:54 Triad Crime Gangs 03:11 Strongmen Invade United States 03:45 Crimes by Triads 04:09 Triad Prison Escape 04:34 Libel and Slander Laws 05:35 Psychic Impressions Section 05:46 Saving Face 06:45 Child Rearing 07:53 Black Dragons 08:21 Child Exploitation 09:05 Land Use 10:11 Bloodless Coup by Triads 11:24 Triad Takeover of a Port City 12:25 Security Cameras – Bank Accounts 13:16 Stealth Genocide by Triads 15:58 Conclusion

. . . . .

This was my research on Google AI yesterday … that which was pertinent to the video in this post.

Is it a crime to practice sorcery in Hong Kong?

“While Hong Kong doesn’t have a specific modern law explicitly banning “sorcery,” severe forms of it, especially those involving harm, fraud, or linking to unlawful societies (like triads), are criminalized under existing laws, drawing from historical Chinese prohibitions on “wugu” (black magic) and the Societies Ordinance, meaning certain magical practices can lead to prison time, particularly if they cause physical harm or are associated with organized crime.

What’s Criminalized (Likely):

  • Wugu/Black Magic: Practices like “ku poisoning,” human sacrifice for magical purposes, or employing curses causing severe harm (like nightmare demons or injury) were historically punishable under Chinese codes and remain illegal through general criminal statutes.
  • Unlawful Societies: If sorcery is tied to illegal triad activities or secret societies, participation or aiding them is a serious offense under the Societies Ordinance, carrying hefty fines and prison sentences (up to 7 years).
  • Fraud & Harm: Practices that defraud others (e.g., charging for fake cures) or cause actual physical or mental harm (e.g., severe psychological distress from curses) can be prosecuted under general laws.

What’s Generally Tolerated (But Monitored):

  • Folk Practices: Many traditional Chinese folk rituals, like “villain hitting” (打小人 – beating effigies to curse enemies), which are common in Hong Kong, are generally tolerated unless they cross into actual harm, fraud, or break other laws.
  • Cultural/Religious Practices: Officially recognized religions and certain cultural practices are protected, but those deemed “superstitious” or “cults” by authorities might face scrutiny, notes Wild Hunt.

In essence: Simple spells or charms are unlikely to be crimes, but if “sorcery” involves serious physical harm, large-scale fraud, or connections to organized crime, it becomes illegal in Hong Kong, drawing from both traditional Chinese legal concepts and modern criminal laws.”

……………………………………..

Is it a crime to practice sorcery in China?

“Yes, Chinese law forbids witchcraft and sorcery. Activities categorized by authorities as “superstition” and “evil cults”—which often include folk religious practices with perceived superstitious elements—can lead to criminal charges.

The government and the ruling Chinese Communist Party (CCP) actively oppose these practices.

Legal and Political Context

  • “Superstition” and “Evil Cults”: The government often labels religious activities that fall outside the five officially recognized religions as “superstition”. These labels are used to prosecute individuals under anti-cult laws, as seen in cases involving shamans and other folk practitioners.
  • Political Crimes: Historically and currently, sorcery is often treated as a political or heretical crime, especially when it involves government officials. Senior officials have been jailed for corruption and accused of “superstition” as part of efforts to blacken their names and highlight wavering faith in the Communist Party’s ideology.
  • Targeting of Practices: The authorities have historically called for crackdowns on “witches, sorcerers, and other criminal elements who practice feudal superstition to engage in hooliganism, swindling and even go so far as to kill people”. This highlights that the concern is often tied to perceived social disorder or criminal activities associated with these beliefs.
  • Accusations: While the practice of sorcery is criminalized, it is also illegal in China to accuse someone of being a witch in a way that leads to social ostracization or harm. This law aims to prevent the type of social persecution (such as “witch hunts”) that can occur in rural communities.

In essence, while general folk beliefs are widespread in China, the state maintains strict control over what is considered acceptable practice and actively criminalizes activities it deems “sorcery” or “superstition,” particularly if they challenge state authority or are associated with criminal behavior.”

……………………………………….

Are Hong Kong laws about sorcery different from those in China Mainland?

“Yes, Hong Kong’s laws regarding “sorcery” differ significantly from mainland China’s due to its separate legal system (common law) and “One Country, Two Systems” framework, where mainland China generally prohibits such practices as superstitious and harmful, while Hong Kong deals with related acts under broader criminal laws like assault, fraud, or importation of harmful substances, rather than specifically banning “sorcery” itself, though its media regulations have banned supernatural themes. Mainland China explicitly forbids “witchcraft and other instances of feudal, supernatural beliefs,” while Hong Kong focuses on the harm caused by alleged magical practices, like poisoning food with bodily fluids.

Mainland China’s Approach

  • Explicit Ban: Chinese law prohibits “witchcraft and other instances of feudal, supernatural beliefs” and views them as harmful superstitions, often cracking down on “evil cults”.
  • Focus on Ideology: The goal is ideological control and promoting socialist values, discouraging practices deemed backward or superstitious.

Hong Kong’s Approach

  • Common Law System: Hong Kong uses the common law system, distinct from mainland China’s civil law system, focusing on common law principles.
  • No Specific “Sorcery” Law: There isn’t a specific law against “sorcery”; instead, acts like placing bodily fluids in food (believed to be for curses) are prosecuted under existing criminal laws, such as those for assault, poisoning, or causing public nuisance, as seen with domestic workers.
  • Media Censorship (Historical/Current): While not a criminal law, Hong Kong’s media regulations (influenced by mainland policies) have historically banned content promoting “supernatural beliefs,” though this is more about media content than criminalizing belief.

Key Difference

  • Mainland China bans the belief and practice as superstitious ideology.
  • Hong Kong prosecutes the actions resulting from such beliefs (e.g., poisoning) under general criminal statutes, treating them as harmful acts rather than purely supernatural offenses.”

……………………………

Is it a crime to practice sorcery in the United States?

“No, practicing sorcery (or witchcraft) itself is generally not a crime in the U.S. due to First Amendment religious protections, but laws against fraud, deception, and harming others still apply, and some local ordinances (like old bans on fortune-telling) have existed, though they are being repealed. While historical laws criminalized witchcraft, modern U.S. courts recognize witchcraft as a legitimate religion, but actions like scamming people under the guise of magic, or engaging in illegal rituals (like prohibited animal sacrifice), are prosecutable offenses.

Key Points:

  • Religious Freedom: The First Amendment protects witchcraft as a religious practice, similar to other faiths, in the U.S..
  • No Federal Witchcraft Law: There are no federal laws making witchcraft illegal.
  • Local Exceptions/History: Some towns, like Millsboro, Delaware, had outdated bans on fortune-telling or “pretend” magic, but these are being removed, notes this A&E article.
  • Fraud & Harm are Illegal: If someone uses “sorcery” to defraud, scam, or harm another person (e.g., financial fraud, harassment), those specific criminal acts are prosecuted, not the belief in witchcraft itself, according to JustAnswer users.
  • Historical Context: Laws criminalizing witchcraft in the American colonies (like those leading to the Salem Witch Trials) are long gone, though they show the historical roots of such prohibitions.

In Summary: You can’t be arrested for being a witch, but you can be arrested for crimes committed while claiming to be one (like fraud).”

……………………………………….

China Triads

“Chinese Triads are transnational organized crime syndicates originating from secret societies in China, known for activities like extortion, drug trafficking, human trafficking, and controlling illicit businesses (gambling, loan sharking) across Greater China and the global Chinese diaspora, with major groups like 14K, Sun Yee On, and Wo Shing Wo engaging in both traditional underworld crimes and legitimate business fronts, especially in entertainment. They have complex hierarchical structures, use code names, and have deep roots in historical Chinese societies, evolving into powerful global criminal networks.

Key Aspects:

  • Origins & History:

Descended from anti-Qing secret societies (like the Heaven, Earth, and Man union), they flourished in Hong Kong and Macau, expanding globally through migration.

  • Major Groups:

Prominent Triads include 14KSun Yee OnWo Shing Wo, and Shui Fong (Wo On Lok).

  • Activities:

Drug trafficking (heroin, ecstasy), extortion, loan sharking, human trafficking, illegal gambling, control of nightclubs, counterfeiting, and involvement in legitimate entertainment.

  • Structure:

Hierarchical, often using numerical codes (e.g., 489 for leader, 426 for enforcers/Red Poles) and roles like Incense Master (ceremonies) and Vanguard (recruiting).

  • Global Reach:

Operate in Mainland China, Hong Kong, Macau, Southeast Asia, North America (US, Canada), Europe (UK, Netherlands), Australia, and more.

  • Modern Operations:

Mix traditional crime with white-collar activities, money laundering, and control over legitimate businesses, especially in the HK/Taiwanese film/music industries.

In essence, Triads are highly organized, historically rooted Chinese criminal networks that have adapted to modern global crime and commerce.”

……………………………..

Triad (organized crime)

https://en.wikipedia.org/wiki/Triad_(organised_crime)

Chinese government connections

Due to their history of “patriotic” work in support of various political movements and factions, triads have long been reported to have connections to the Chinese Communist Party, often via its related united front groups.[12][62][63][14] According to The Washington Post, the Chinese government has engaged in the “selective use or tolerance of criminal groups for geopolitical purposes. Mixing illicit activity and patriotism has become a hallmark of some Chinese organizations with overseas interests.”[64] Triad members have acted as agents of the party-state in achieving its political objectives of suppressing dissent, quelling protests and silencing, intimidating, and coercing critics both at home and abroad, particularly in Hong Kong, Taiwan, and countries with high concentrations of ethnic Chinese diaspora.[11][65][66]  …

… Many triads emigrated to Taiwan and Chinese communities worldwide:

…………………

Black Dragons (gang)

https://en.wikipedia.org/wiki/Black_Dragons_(gang)

“The Black Dragons (Chinese: 黑龍; JyutpingHaak1 Lung4) was a Chinese-American criminal organization and street gang that was formed in 1980 by Chinese immigrants in Lincoln Heights, Los Angeles, California. It was started by a group of young men who banded together to protect themselves from other Asian and Latino gangs. The Black Dragons operated in Los Angeles and the San Gabriel Valley for over two decades. At the gang’s peak it had over 100 core members. They may sometimes be identified by the color black. During their downfall in 2002, the convicted core members have made peace and united with other Asian rival gangs in prison. Over the years, One Black Dragon, ( have made allies with numerous leaders and high ranking members of previous rival organizations, this member’s information from a reliable source. This member is also a member of the Hop Sing Tong, The Bamboo Triad’s current leader ( 黃少岑 (Huang Shao-tsen), “Yao Yao”) is also his god father, has family ties with the Asian Boyz Gang, and relations with Vietnamese Boyz Gang, Cool Boyz, and Wah Ching.

The gang preyed on the Asian American communities as a source of income and is unique compared to other Asian crime groups as they were involved in both organized and street-level crime. The revenue from organized crime came mainly from extorting brothels, prostitution, money laundering, the distribution of narcotics, and counterfeiting merchandise. At street-level, the gang was involved in a wide range of crimes that included murder, robbery, home invasion and car theft.

The Black Dragon’s influence was strong in the San Gabriel Valley, during the mid-1990s until its previous downfall in 2002. After two decades, the gang gained the attention of federal authorities because of their involvement in violent criminal activities. The Federal Bureau of Investigation (FBI) opened a case against the Black Dragons in 1999. The FBI then created the Black Dragon Task force and the three-year investigation dubbed “Operation Back Door” led to the convictions of multiple gang members, stemming from murder, attempted murder, armed robbery, extortion, illegal possession of firearms and Racketeer Influenced and Corrupt Organizations Act (RICO) charges. The gang was taken down in one of the largest gang sweeps of 2002, as federal agents simultaneously raided and arrested 30 of its core members, following up with convictions for over half of them in 2003, including a twenty-four year sentence for each of the top three members of the gang.[2]

The gang had been identified as a top threat with a history of violence by various law enforcement agencies, according to FBI Agent Kerry Smith who headed a West Covina FBI unit that targets Asian criminal enterprise and violent crime. “These guys weren’t afraid to commit violence,” Smith said.[citation needed]”

………………….

Wugu ku poisoning Nightmare Demons

“The terms “Wugu” (or simply “Gu” in many contexts), “poisoning,” and “Nightmare Demons” relate to a complex set of ancient Chinese beliefs surrounding a form of black magic, witchcraft, and the physical manifestations of severe illness and psychological distress.

Understanding Gu Poisoning

Gu (蠱, sometimes referred to as wugu or ku) is a legendary substance and practice rooted in Southern China folklore and traditional Chinese medicine, dating back as far as 610 CE.

  • Concoction: The core practice involved placing several venomous creatures, traditionally the “five poisons” (viper, centipede, scorpion, toad, and spider), into a sealed container and allowing them to fight and consume each other. The sole survivor’s essence or fluids were then used to create a potent poison.
  • Purpose: The gu was used to create a curse, inflict illness, control individuals, or cause misfortune and death. It was often associated with women of the Miao minority and linked to social stigmas.
  • Symptoms: Victims were said to experience severe internal pain, swelling, organ decay, and in some cases, insanity. The effects were slow-acting, sometimes taking up to ten days before symptoms appeared.

Connection to “Nightmare Demons”

The term “Nightmare Demons” likely stems from the description of the gu creatures as evil spirits or demons (chong 蟲) that possessed the human body, causing a range of physical and psychological torments.

  • Demonic Possession: Ancient texts described gu syndrome (gu zheng) as a form of “demonic infestation” (guizhu), where the “vicious parasites” or “evil spirits” were thought to gnaw at the victim from within.
  • Psychological Trauma: The psychological aspect of gu poisoning was significant. It was considered the “worst nightmare of any human being,” representing “darkness, rottenness, slithering vermin, poisonous snakes, betrayal, black magic, backstabbing murder and in medical terms, progressive organ decay accompanied by torturous pain and insanity”. The belief in gu was often fueled by superstitious fears and used by those wishing to hold power over others.

Modern Perspective

From a modern medical and scientific perspective, gu poisoning is largely considered a mythological belief or a misinterpretation of severe, chronic parasitic infections, such as schistosomiasis or entamoeba infections, that had become systemic in a patient. The symptoms aligned with those caused by aggressive helminthic, protozoan, fungal, spirochete, or viral afflictions prevalent in ancient times.”

…………………………..

Are libel and slander crimes in China, Hong Kong, and the United States?

“Yes, libel and slander are crimes in mainland China and Hong Kong, but primarily civil matters in the United States, though some U.S. states have criminal libel laws; China and Hong Kong treat defamation more seriously, with potential imprisonment, especially for offenses impacting public order, unlike the U.S. where it’s generally a civil tort for reputation damage.

Mainland China

  • Yes, it’s both civil and criminal: Defamation can lead to imprisonment, especially if it seriously disturbs public order, involves large online dissemination, or damages national interests.
  • Criminal Penalties: Can include significant prison time (up to three years for “serious” cases) and administrative punishments like fines or detention.

Hong Kong

  • Yes, it’s both civil and criminal: Libel remains a crime under Hong Kong law, though rarely prosecuted criminally compared to civil actions for damages.
  • Civil Law: Based on English common law, with a focus on reputation damage, and unlike England, Hong Kong hasn’t adopted the “serious harm” threshold.

United States

  • Primarily Civil: Libel (written) and slander (spoken) are generally torts (civil wrongs) leading to lawsuits for damages, not criminal charges.
  • Criminal Libel (Rare): A few U.S. states retain criminal libel statutes, but these are rarely used and face significant First Amendment scrutiny, requiring extreme cases to be deemed criminal.”

…………………………………….
Here is another reference that I read …

Citation: “Triads,” by Peter Yam Tat-wing, Assistant Commissioner (Crime), Hong Kong Police Force Headquarters, Hong Kong

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

United States, West Coast, California, Los Angeles, China, Hong Kong, sorcery, law, cults that kill, mind control cults, organized crime, triads, Black Dragon Triad, child-rearing, government, finance, real estate, economy, survival, social unrest, human rights, child trafficking, peace, trade war, psychic impressions, treason, sedition, bullying, slander, libel, defamation,

Notice: Moral Rights of Authors . by Alice B. Clagett

Notice: Moral Rights of Authors

Notices

Dear Ones,

I found out there is such a thing as ‘moral rights of authors’ …

Link: “Moral Rights of Authors,” in English Wikipedia … https://en.wikipedia.org/wiki/Moral_rights

Of particular interest is this assertion: “The preserving of the integrity of the [author’s] work allows the author to object to alteration, distortion, or mutilation of the work that is ‘prejudicial to the author’s honor or reputation’. In other words, it seems that international law offers an author the right to object to derogation of his or her works; this is also called the author’s ‘right of integrity. Here is more …

“Moral rights are set forth in Article 6bis of the Berne Convention for the Protection of Literary and Artistic Works, to which most countries in the world (including the United States) are signatories …

“In the United States, moral rights are also protected, with respect to certain visual artworks, by the Visual Rights Act.” — Link: “Moral Rights,” in Wikipedia … https://en.wikipedia.org/wiki/Wikipedia:Moral_rights ..

. . . . .

I put this information on my ‘About’ page under Notices … https://awakeningwithplanetearth.com/about/ ..

In love, light and joy
This is Alice B. Clagett.
I Am of the Stars … and so are you!

Written and published on 16 April 2024

…………..

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). Attribution: By Alice B. Clagett.
More license information

…………………………………………………….
…………………………………………………….

law, international law, human rights, notices, personal notes,