6 min read 0

How Online Scammers Are Eroding Dating App Profits—and What Can Be Done About It

Online dating has become a cultural cornerstone, connecting millions in search of love, companionship or just a spark. Yet, beneath this digital romance lies a growing threat: scammers who exploit these platforms for profit, leaving both users and dating app companies reeling. The financial toll of these fraudulent activities is staggering, and it’s hitting dating apps where it hurts most—their bottom line. This article explores how scammers are undermining the dating industry, backed by recent statistics, and proposes robust solutions involving identity verification, anti-fraud measures, and streamlined reporting to protect users and restore trust. The Financial Fallout of Scams on Dating Apps Romance scams have surged in recent years, with scammers crafting fake profiles to prey on unsuspecting users. According to the Federal Trade Commission (FTC), consumers reported…
10 min read 0

Positive influence, my story in return…

I have reached out in gratitude and gotten a response back from someone I looked up to during my struggles in my early 20s-30s, after my father had disappeared intentionally. In this letter back to their response “Good to Hear from You Jason” and their wish to read more as I offered, I wrote about my story after their influence seeded in me and continues to take shape and form. I share this here as I never been prompted to take the time and write about my young adult life and the recent challenges that got me to where I am today. And I think it important to share to others, if not for inspiration, to seed a curiosity  for a deeper understanding: Hi [name omitted], Shortly after…
3 min read 0

The Dangers of Joining the CIA: A Legacy of Misplaced Power & Selfish Ambition

The Central Intelligence Agency (CIA) has a long and complex history, dating back to the post-World War II era. Established in 1947, the CIA was created in response to the emerging threats of the Cold War, including the arms and space races. However, from its inception, the agency has been plagued by a culture of misplaced power and selfish ambition, which has led to a legacy of danger and deception. One of the earliest and most influential operations in the CIA’s history was Operation Paperclip, a secret program that recruited former Nazi scientists and engineers to work for the United States government. This operation set a precedent for the CIA’s willingness to compromise its values and morals in pursuit of power and knowledge. By recruiting individuals with questionable…
4 min read 0

Got Swedish Fish, Godzilla? Social Media Scams at Large …

[Edit: Fake Legal Front Section, Victims Accounts Used to Advertise Their Legal Scam to those Already Scammed: 2025-03-10] In recent months, a surge of online scams has been targeting Facebook users, with scammers posing as representatives of the social media platform itself. These scams aim to phish users’ account credentials and in some cases, even impersonate lawyers from legal firms to extract more money from victims. My recent investigation has shed light on the tactics used by these scammers including their approximate operation locations, and the alarming rate at which they are operating.   The Scam: A Closer Look The scam typically begins with a fake profile claiming to be from Facebook, reporting user violations and threatening to suspend or terminate the victim’s account. The scammer then contacts…
2 min read 0

What is Man In The Middle Shadow Banning?

Man-in-the-Middle (MITM) Shadow Banning Man-in-the-middle (MITM) shadow banning is a theoretical or advanced form of shadow banning where a third party—such as an internet service provider (ISP), a network administrator, or even a government entity—intercepts and manipulates data between a user and an online platform without the platform itself being aware. How It Works: Interception: The attacker or intermediary intercepts a user’s requests before they reach the intended website or social media platform. Modification or Filtering: The attacker selectively blocks, modifies, or delays the user’s posts, interactions, or visibility while making it appear to the user that everything is functioning normally. Stealthy Execution: Unlike traditional shadow banning, where a platform itself hides a user’s content, MITM shadow banning is external. The platform may have no direct involvement or…
4 min read 0

The Case for Competency in Public Speaking: A New Standard for American Politicians?

In the landscape of American politics, the authenticity and conviction of public figures are increasingly under scrutiny. There’s a growing sentiment among the public that politicians, often seen as scripted “mobots,” lack the genuine ability to convey their true beliefs or engage in unscripted dialogue. This situation has sparked a debate on whether public office holders should be required to demonstrate their competence through a public speaking exam, specifically one that assesses their ability to communicate without reliance on scripts or teleprompters.   The Current State of Political Discourse Contemporary political speeches are often meticulously crafted by speechwriters or, more recently, supplemented by AI tools like GPT. While these practices ensure a polished delivery, they also allow powerful special interest groups to exert significant control over political messaging.…
4 min read 0

The Erosion of Critical Thought in the Age of Overtime: How Work Hours Shape Our Cognitive Landscape

In today’s fast-paced world, where the demands of work often extend beyond traditional hours, the implications for family life, media consumption and societal discourse are profound. As work hours increase, the time and energy available for critical thinking diminish, transforming the way families engage with news and information, leading to a landscape where entertainment overshadows education, and where news can morph into what we traditionally recognize as yellow journalism. The Impact of Extended Work Hours Extended work hours have a direct correlation with decreased engagement in family activities that foster critical thinking. Research by Greenhaus and Beutell (1985) highlights how work-family conflict can result in reduced family interaction, where family members are too exhausted or preoccupied to engage in meaningful discussions or educational pursuits (Greenhaus & Beutell, 1985).…
6 min read 0

The Good, The Bad[ass] and the Ugly of Flabby Hoffman’s “Colony Collapse Disorder Vol 1”

Flabby Hoffman’s book “Colony Collapse Disorder, Volume I” published on November 24th, 2024 [Three Volumes published concurrently around then.] presents a satirical and highly critical perspective on American politics, culture and society. The central thesis revolves around the idea that a cabal of wealthy elites, referred to as “Ameri-Nazis,” has been secretly manipulating events since the end of World War II to establish a crypto-fascist government in the United States, culminating in the potential rise of a totalitarian Fourth Reich. The author, Flabby Hoffman uses a sarcastic, irreverent and often vulgar tone to deconstruct historical events, political figures, cultural trends and media narratives. The Good (The Thought Provoking Premises): The Fourth Reich: The book posits that the collapse of Nazi Germany wasn’t a defeat but a strategic retreat.…
6 min read 0

State-Sponsored Cyber Attacks and the Facade of Democracy

In the digital age, the battleground for global power dynamics has increasingly shifted to cyberspace, where state-sponsored cyber attacks serve not just as tools for espionage but also for political sabotage. This article delves into examples of such operations, focusing on the tensions between the United States and the BRICS countries, and how the rhetoric of promoting “democracy” often masks underlying geopolitical strategies. State-Sponsored MITM Attacks Stuxnet (U.S. and Israel vs. Iran – 2010): This worm, designed to sabotage Iran’s nuclear program, exemplifies how cyber capabilities can be weaponized for physical impact. Although not a traditional Man-in-the-Middle (MITM) attack, it involved intercepting and altering control system communications (Langner, 2011). Quantum Insert by NSA (U.S.): This technique allowed the NSA to intercept and manipulate internet traffic, potentially for MITM…
6 min read 0

Unmasking the Global Epidemic of Sexual Abuse: From Power Structures to Mind Control Manipulation

Introduction Sexual abuse, when intertwined with power and covert manipulation, creates a tapestry of exploitation that extends beyond physical and emotional harm into areas of psychological control and strategic manipulation. This article expands on the historical context of such abuses, particularly focusing on mind control experiments like Project Monarch, and how these practices have been used to create “patsies” or drones, capable of being triggered to commit acts on behalf of shadowy interests. Historical Context and Covert Programs Project Monarch and MKUltra Historical Roots: The CIA’s MKUltra project, initiated in 1953 under the directive of CIA Director Allen Dulles, aimed at developing mind-control techniques through drug administration, psychological torture, and other methods. Project Monarch, allegedly a subset or continuation of MKUltra, focused on more advanced techniques of creating…