“ARCHITECTURE OF OUR HUMAN CONDITION, IS DEFINED THROUGH OUR ACHIEVED STATE OF CONSCIOUSNESS…”
“ARCHITECTURE OF OUR HUMAN CONDITION, IS DEFINED THROUGH OUR ACHIEVED STATE OF CONSCIOUSNESS…”

The 11th Philosophy, Honey-Bee Critical Theory
A Doctrine of the 29th League, by riaaz ally 2017- present

the vendetta of playing opposites may be obvious, however the ambiguity in the vendetta described below,
required a soft side, from a ridiculous accusation and allegation.
Such a soft vendetta, especially if the emancipation gains may of been utilized to progress liberations…such as may be used for feminism…(elaborate on this more…potential allegations from outputs of neuroscience’s used such as evoked, anxieties, and extended on with methods used in the so said interrogation )
regardless if it had been that i naively supported the strategy with an agenda of my own which fell in favor for purpose of the total objective of the underlying political and personal agendas…
required an even softer touch…which was my agenda…the moral higher ground of moralities…
as such…the unfavorable and harmful challenges I faced,
would be something to write about.
Driving such a special purposes vehicle for opportunists with such immoral and illegal agendas, may of gained credibility…with the fraudulent allegations acquired from the cooperating public through deployed independent agencies (IA) integrated with the legal forces. These may have aided their agendas objectives and goals with some similarities to that of Karl Marx and Stalin where Stalin fabricated many devices against Karl Marx purely to exile him, imprison him or assassinate him.


together, in social media …they see things together…the invisible…there is just somethings u may hear…they just cant say…declaring their independence, celebrating…a victory…1 and the still the same…1 side, 1 direction, 1 structured way to…gather data… …it may be just, 1 thing…besides a hoax…take a sentence apart, unstructured and lucid…the things we see before our eyes…even…to combating terrorism…and hocus pocus methods…such as…using identified, listed…point scoring apps for terrorism and organized crime methods to combat and counter, in the hands…of those who can afford being surreal… relaxed human rights thresholds, a worldwide phenomena…lol…i suppose whats needed…is 1 settler…1 bullet…i take u out…then i exist…dont need thousands to exist, just need 1…its been…keeping it surreal…the reason why surreal, forcing that irrationality as real and true…surreal reality…science can be corrupt…and biased…in the u.s u can run…torture programs…in south africa it still exists…but not at all legally…they would have reason and support…to run…science based programs…even if they had…slavery for centuries…if u think u have a reason…it will still be false…bit of reid…such as paranoia…reading this paragraph…then missing the point would be like…stating both resistance and interrogation tactics…pulling the moral high ground first…and not running a racket…i offer u a cigarette u take it u have no shame have you to ask me still…lol…he missed the point…of ”the architecture of our human condition…is dependent on our achieved level of critical consciousness…”…( coherently wiped the keef and cool away…since that would be a big part of their accusation game and came with …another tactic…says u all wrong…)
all structured how can be lucid and unstructured…
off the moral high ground therefore
unstructured and lucid
these wouldnt be able to be banned either…drafts which could be written, wouldnt have the same primary source experience… others may be very political too… no solutions and so on… very strong human rights message…a hectic story… perhaps critical close the follow thru of the sentences for coherence…
still requires many updates which too include assassinations… hierarchies…censorships, arts, protection orders, blackmails, coherences, elaborations and reword rewrite, trusts, pyramids, oaths, like hypocritic oaths, references where needed, medical argument of recovery, life partner, friendship, work colleague, family, social interaction, self-determination and reflection, dusty feet, …false reports reconstructs from he say she says used in interrogation, legality in terms of lawyers presence, detaining legalities, legal notifications, torture methods used for forced confessions, utilizing interrogation methods to alter behaviours for empirical observation to construct reports,…which laws made it possible that interrogations were able to convict innocent people, including self-incrimination, how such interrogations are operated, and much much more, how these forces make false claims to the public about going toos…eg. going to arrest and going to pick up and so on and so forth…deception tactics, it has multiple uses, …interrogation methods such as Reid and so on and so forth, forced confessions, voluntary and involuntary confessions, validity of it in a case, case studies using coercion and manipulation, neurosciences used in terrorism suspects interrogations, prolonged and abusive interrogations, …
have written chapter 1 over and over… at least 19 times
all the raw versions…
so the vendetta chapters are still quite raw
as well as some parts of chapter 2…
its more aggressive, is still raw ish
Along with every medical argument…
Support and family support too…
All in line with all the correct advice…
Been surreal world bullshitted in a string

Social media accounts are subject to threats of identity theft, just like online bank accounts or social security numbers. In some cases, social media identity theft is as simple as someone choosing your full name on social media websites and using it for fraud. The best thing you can do is be aware of the threat and monitor your online presence.

Earlier today a good friend, Professor Niklas Myhr aka “The Social Media Professor” of Chapman University, reached out to me about his social media profile picture, bio, and content, being used to impersonate him. He was looking for thoughts, ideas and legal solutions to help fix the problem (because this is a problem we all face, Professor Myhr gave me permission to use his name in this post).

I don’t think Professor Myhr (follow him on Twitter) is very happy about his identity being used by someone else. I say this with confidence because I know exactly how he feels. Over the years, my profile picture and bio have also been used by scammers to misrepresent who they are. Because this is a problem that seems to be getting worse, I’m sharing a few legal tips you can use if this happens to you.

Before I go forward, please understand that while I am a really good (and very humble) California lawyer, I’m not your lawyer. No legal advice is being given in this post. What I am trying to do is share concepts, approaches, and resources you can use to protect yourself.

General
Social media profile theft (SMPT) comes in all shapes and sizes. For purposes of this post, I will be referring to two types of SMPT which include:

(1) recreational SMPT and

(2) criminal SMPT.

Recreational SMPT usually involves people who are bored and seeking attention. Some are nasty individuals using online anonymity to disrupt other people’s lives. They show up, set up their SMPT and see what happens.

Criminal SMPT uses the same approaches to defraud and commit crimes. They are trying to scam money from unsuspecting victims or establish relationships using false facts and fraud.

Regardless of the motives of criminal SMPT, the perpetrators are cruel, hateful and usually exhibit an intent to destroying reputations, businesses and promote a criminal enterprise.

Both kinds of SMPT can be slowed down and often completely stopped using these approaches and techniques.

Tools, Approaches, and Ideas
Recreational SMPT

See the source image

There are several different ways to deal with recreational SMPT:

  1. Ignore the SMPT: Avoidance is often the best policy. Don’t feed their desire for interaction. Report them to the social media platform provider using the steps below and then ignore them.
  2. Screenshot the Profile: Using the services below, screenshot the fraudulent profile to preserve the evidence.
  3. Call Them Out: If you can, post on their platform that it is a fake account and that you are reporting them to the local police. Private message them with the same message.
  4. Block Them: Next, block the fake account from all your active accounts. Then move on.
  5. Report Them: Using the resources below, report the SMPT to the specific social media platform and IP host provider (use template letter I provide below)

Criminal SMPT

  1. Report the SMPT to local law enforcement. Use the screenshot tools mentioned below to collect evidence.

Because criminal SMPT is by definition breaking the law, in addition to having the local police authorities step in to handle the fraud, you may also have state and federal civil claims allowing you to bring money damages and equitable relieve (injunctions) against the criminal SMPT. Depending on the state and legal argument, you may also be entitled to reimbursement of attorney fees and costs.

Screenshots and Videos (Collecting Evidence)
Learn how to video record or take screenshots on your computer. When you do start to collect evidence, write down the time and date of each screen shoot or video recording.

On Mac

Picture

See the source image

Press Command (⌘)-Shift-4; Move the crosshair pointer to where you want to start the screenshot. Drag to select an area. When you’ve selected the area you want, release your mouse or trackpad button. Find the screenshot as a .png file on your desktop.

Video

Record Video with QuickTime Player. This allows you to create a movie of all or part of your Mac screen. From QuickTime, choose File > New Screen Recording.

On Windows

Picture

Click the window you want to capture. Press Alt+Print Screen by holding down the Alt key and then pressing the Print Screen key. The Print Screen key is near the upper-right corner of your keyboard.

Video

Use Snagit or Jing from TechSmith

Smartphone

Various third-party apps and tools are available to live video capture a stream while using your smartphone. The above solutions that allow you to capture content from your laptop or desktop are easiest.

Letter to Social Media Provider
Once you find out that you’re a victim of recreational or criminal SMPT, complete and send the provided template letter mentioned below to the social media platform hosting the fraudulent SMPT. The letter is just a template so modify as needed and share as much detail as possible.

The letter places the platform on legal notice that a user is improperly targeting you with recreational or criminal SMPT. If you have been harmed emotionally or physically or, if you or your business has been damaged, then include all details.

Point out that the person committing recreational or criminal SMPT has violated the platform’s terms of service (TOS) agreement and should be banned from the platform. Include any identifying information you have including the recreational or criminal SMPT handle, username, and screenshots.

If the recreational or criminal SMPT has violated the law and committed a criminal act, advice the service provider that you have reported the recreational or criminal SMPT activity to the local police and legal authorities. Include their contact information, and case identification numbers, in the letter. Also, demand that the service provider so the same.

I believe the best practice is to send this letter via Certified Mail Return Receipt Requested, Federal Express or UPS. This way you have written confirmation that the information has been received by the platform. It also allows your complaint to stand out above and beyond other complaints submitted via email or direct message on the provider’s social media platform.

Yes, it is perfectly OK to simply submit all the above through the platform portal, but the chances are high your message will only get an automated response and fall on deaf ears. In my opinion, the best course of action is to send the snail mail letter via Federal Express, UPS, or US Postal certified mail.

Lawsuit
If the recreational or criminal SMPT problem continues or, if the harm is so high such that simply notifying a platform provider is inadequate, file a lawsuit to (1) identify the person who is engaging in SMPT, (2) stop the harm, (3) obtain an injunction, and (4) seek money damages.

You can either hire a lawyer or do this yourself. If you need help finding a top-rated lawyer in your state to do this for you, I recommend this service.

If you don’t know the identity of the recreational or criminal SMPT, most jurisdictions allow you to prepare, file and serve a lawsuit naming the unidentified individual as a Doe defendant. Depending on your legal jurisdiction and the recreational or criminal SMPT’s misconduct, you may be able to bring causes of action for negligence, infliction of emotional distress, defamation (libel), civil conspiracy, harassment, interference with economic advantage, and other related causes of action.

Once your lawsuit is filed, your lawyer can use the power of a subpoena and serve the social media platform hosting the recreational or criminal SMPT content with the subpoena demanding all information relating to the account.

The service provider may be able to use metadata to ascertain the IP address of the recreational or criminal SMPT or internet provider used by the recreational or criminal SMPT. The IP address information can be used to verify the internet provider of the recreational or criminal SMPT.

A similar subpoena can then be issued to that internet provider regarding all contact information associated with that particular recreational or criminal SMPT. You should be able to get the name, billing address and other contact information like contact number, email and more from one or more of the providers. In big damages cases, experts such as Alex Holden are skilled at doing this for you.

Once this is done, you can have the local sheriff or process server serve the recreational or criminal SMPT with a summons and complaint (a lawsuit). In California, the recreational or criminal SMPT will have about 30 days to respond. Again, the easiest way to get all of this done is to use an experienced law firm in your state.

This process was done in the lawsuits below. One involved a business receiving false and harmful reviews.

Sample lawsuit
Teens Sued for Fake Facebook Profile

Want to see what an $8M lawsuit against a troll looks like? Click here
and for all you TMZ fans out there… James Woods sues troll for $10M

Criminal Consequences

When a recreational or criminal SMPT commits a crime, he or she can and should be held accountable. While you can use the above steps to determine the troll’s identity, for safety and preservation of evidence needs, I suggest you immediately get your local police and District Attorney’s Office involved.

Present your demand and evidence to the police and District Attorney’s Office in a letter similar to what is described above. Make sure it is physically delivered to the police agency and/or District Attorney’s Office via certified letter, Federal Express or UPS. Place these agencies on written notice that there’s a criminal problem. If your safety is at issue, emphasize this fact. A clear and concise paper trial is key to getting these agencies involved.

New state and federal laws re cyber-stalking, harassment, bullying and hacking roll out each year. Contact your local lawyer or police authorities for updates on pending and new cyber-harassment related laws.

Do It Yourself
Although I recommend getting an experienced lawyer involved (you may be able to do this on a contingency fee basis with no out-of-pocket expense), you can take the following steps yourself.

The initial TOS violation letter (below) can be completed and mailed as per my instructions.

A Small Claims or Superior Court lawsuit can be filed in pro per (without a lawyer), and the subpoena can be issued by the court on your behalf.

If the Internet provider is not cooperative or fails to comply with the subpoena, you can independently research the IP address of the troll using free online services (Do a Google search “How to trace an IP address”).

Once you obtain the recreational or criminal SMPT internet IP address, you can have a more specific subpoena issued by the court to acquire the personal information of the recreational or criminal SMPT from either the social media platform provider and/or the Internet provider.

Template Letter

Notice of Social Media Profile Theft and Fraud: Terms of Service Violation
DEMAND FOR ACCOUNT CLOSURE AND REPORTING

Name of Company (Social Media Platform Company or Internet Provider)
Address
City, State Zip Code

Re: Your Account Username: @TestAccount
Recreational or Criminal Social Media Profile Theft Username: @xyz
Date(s) of Violation: Date

Gentlepersons:

I am the victim of illegal civil and criminal online harassment and identity theft. The above-identified person, who is using your platform with your permission, has caused harm to me. This person has stolen and is using my identity (profile picture, bio and more), to defraud others and in violation of your terms of service agreement.

Before bringing in legal counsel to assist me with this matter, I thought I would first give you the opportunity to help. What happens next is completely up to you.

Please immediately take the necessary steps to prevent this person from causing any further harm. The wrongdoer is in violation of your “Terms of Service” (TOS) agreement, and that violation is resulting in harm to me and third parties.

Please immediately block this person’s account and bar this person and IP address from further use of your social media platform. If you must first conduct an independent investigation, then please do so immediately.

Copies of picture and video screenshot violations are attached (or included in the USB stick). Your independent review of your internal servers will support my concerns and also confirm the wrongful conduct and TOS violations.

[if the action is threatening then include this paragraph] The actions of this person not only violate my civil rights but may also be in violation of certain state and federal criminal laws. By copy of this letter, I am also notifying the local police department, and District Attorney’s Office, of my concerns.

Please confirm in writing, within ten (10) days, that you have taken all of the requested action. If you fail to do so, I will seek all available legal remedies. I trust this will not be necessary.

Your written confirmation to me as to what action you will be taking must be received within the above noted time parameter. Otherwise, I will hire legal counsel to protect my interest and safety. This is not the first of many demands. Please review the above carefully and conduct yourself accordingly.

Your Name
Your Contact Information



Identity Theft (Hacking and Fake Profiles)
ElitePersonalFinance
ElitePersonalFinance
Last Update: February 13, 2021

What is Identity Theft?
Identity theft is basically when a person pretends to be somebody else without that individual’s permission or knowledge to either benefit or cause harm. An identity thief normally takes on another individual’s identity by using their sensitive personal information, including the person’s address, name, date of birth, email, and social media log-in details.

When most people think about identity theft, they imagine someone using another individual’s credit card or bank details to trick the person into buying something or even to steal money from them. But don’t forget that this is actually not the only way it can occur.

Is Identity Theft Illegal?
Identity theft is a crime. It’s illegal to have somebody else’s sensitive personal information with the sole intention of committing a crime. It is also illegal to use, give or make somebody else another person’s sensitive information with the sole aim of committing a crime.

How Does Identity Theft Happen?
Even if you think something is a harmless prank or just a joke, it could still be a major crime. The following are some examples of identity theft, which could easily lead to punishment and criminal charges.

Creating a Fake Social Media Profile
Creating a phony social media profile about somebody else may seem like fun, but it can be categorized as identity theft. If you decide to use someone’s personal information to create a fake online profile to commit a crime or even assist in committing a crime, you can face criminal charges. This would actually include harassing or offend someone or even creating a fake account.

You could also be breaking the social media site’s rules of use. A good example is Facebook. It doesn’t allow you to create an account for another person without their permission or even create more than one individual. If you choose to break all these rules, you are not committing a grave crime, but Facebook can certainly stop you from continuing to use its platform.

Hacking into a Person’s email or Social Media Profile
It is unlawful to access an individual’s emails, social media profiles, or online instant messages using their password or login details without their consent. If you access this information without a person’s permission and you plan to use it to commit a grave crime, such as identity theft, you will certainly face more severe charges. Also, it’s illegal to change someone else’s login details or even password for an online site without their consent.

Example:

Sarah and Jessica go to school together. When in the school library, Diana accessed Mila’s password-protected email without her consent. Diana had seen Mila’s email password clearly written in her diary when in class. Diana sent an email to everyone in their class pretending to be Mila saying, “I hate you all, and I am so much better than everyone here.”

Diana might end up facing criminal charges as she has opened Mila’s secure email account without her consent. She might also face charges for identity theft.

What Will Happen to Me if I Do it?
If you know someone else’s login details and password for online sites and use them or give them to someone else to commit a particular crime, you could be charged with identity theft and easily face up to seven years behind bars.

Think about the different types of password-protected on your computer. This basically includes all the work on your school computer, all your emails, and all of the content on your Facebook page. If you access somebody else’s protected material without their authorization, you could face up to 10 years in jail. If you gain access to somebody else’s password-protected content and think of committing a grave crime with that data, you can easily face more than five years in jail.

What Can I Do to Stop it?
There are many ways you can protect yourself against identity theft.

Always monitor your online profiles
If you think that someone may have hacked into your personal account, immediately change your password and consider deactivating your account. You should also contact the website administrator. Their details are usually on the bottom of the website page.

Stop posting too much sensitive information on your online profiles
If you would not want every person in the world to know it, then don’t put it online or on a social platform. Remember that any information you put online about yourself could be used to guess the answers to your security questions and also hack into your social media, online messenger accounts, or even email.

Always keep your login details for social media and other accounts safely
Use different passwords for every website. Don’t use something simple that can easily be thought of like “12345”. Always make your password difficult to crack. The best passwords usually have eight characters or more and should include a number, a capital letter, and a symbol. Also, try to avoid telling other people your password.

Be cautious when letting others use your own computer or even when using a public computer
Ensure that you are always sign out of your social media websites or email account. If you use a public computer and don’t sign out, other people may access the websites you had open. Never let your password details be saved to a publicly used computer. When other people use your personal computer, make sure that they don’t access your accounts without your permission.

Be careful when banking or making online purchases
Only transfer money or make online purchases from safe and secure websites. If you feel a website is untrustworthy, don’t buy anything from it. It is possible that your information could be stored and passed on to other people without your permission.

Be careful when clicking links
Only click on links to websites that you know are safe. Never download files from websites that you can’t trust.

Be extra vigilant with junk emails
You may receive emails that say that you have won money, a holiday, or an iPad. Be extra careful when giving out your personal information in response to these emails. If it seems too good to be true, it probably is.

What If This Happen to Me?
Tell an adult that you trust. They will be able to give you advice on whether further action should be taken.

If you’re feeling upset and don’t know who to talk to, you can call the Kids Helpline on 1800 55 1800 at any time of day or night to chat confidentially with a counselor.

Record evidence. Print off any fake pages, emails, or profiles and store them in a safe place just if the authorities need them.

Report the identity theft to the website administrator. They may do their own investigation and remove any offending content.

Example:

If somebody created a Facebook profile with your personal details, report it to the administrator by:

Going to the timeline of the fake profile.
Click and then select Report/Block.
Select Submit a Report.
Choose this person is impersonating someone.
Follow the on-screen directions to complete your report.
Then what?

If you have impersonated someone, you should immediately contact them to apologize and instantly delete any fake pages or profiles you might have created.

Talk with an adult that you trust about what you have done. They will be able to give you advice on whether further action should be taken.

Privacy Terms & Conditions
ElitePersonalFinance © Copyright 2021, All Rights Reserved.