The Finger of Reality: Dreams, Madness, and the Call for a Healthy Society

The Finger of Reality

What are humans really looking for?
To be healthy, happy, supported, and to feel safe and secure in their private lives — and to be together.

Humans are so simple! Unless, of course, they are not mentally well.
Because if they are crazy, they will destroy every one of these basic needs and drag others down with them.

To live like a true human, you must be both physically and mentally healthy.
We can’t afford to damage either one.

If you aren’t physically or mentally healthy, not only will you fail at your own tasks, but you will also disrupt the lives of others.


Everyday Battles

And yes, my stalker was at it again today — right when I left my house!
He tracks my movements, him and his dirty, crazy, organized crime family gang. (Pictures were taken!)

This is what mental insanity leads to: obsessions, craziness, and the destruction of other people’s lives.
And it happens because society allows it — all in the name of whatever twisted values they claim to defend, and because they don’t want to spend money on properly dealing with the crazies on the streets or the gangs that operate openly.

“I don’t see you, you don’t see me… and we live happily ever after together. You trying to put me down, and me trying to protect myself.”

But that’s not a good society.
It’s a dirty, corrupted one, where rules are no longer made for people — but for creating chaos.


The Dream: Visitors Beyond

In my dreams, I was inside a huge, all-glass tower on the top-level apartments.
It seemed that my sister owned one of them, and she gave me a tour of her home.

While walking around, I saw a UFO outside the glass walls — a massive globe made of interconnected cards.
It had come out of nowhere from space, moving fast, and then stopped right in front of our windows, watching us.
It followed us as we walked through the apartment.

It was terrifying to see a giant, card-constructed sphere tracking our movements.
We tried to hide from it.
The unknown is always frightening!


The Shape-Shifter

When we moved to the other side of the house, there was another globe — but this one was made from interconnected domino chips.
It could change its shape: from a globe, to a square, to a car, to a bird… even to an arm with a pointed index finger.

As we watched, fascinated by how it shifted forms, a piece of it transformed into an arm, pointing directly at me through the glass.

It was a very scary dream — it felt like I had stepped into another dimension.

When I woke up, I immediately remembered the visual patterns I had seen after ketamine anesthesia — the same moving hexagonal and octagonal shapes, shiny and interconnected in flowing colors.
Later, I even saw a woman’s bag decorated with the same pattern!


A Call for True Humanity

We desperately need normal societies filled with normal, healthy people.
Otherwise, we will destroy humanity — driven by the madness of trying to control the world and replacing normality with abnormality.

The Finger!
It reminds me of The Creation of Adam by Michelangelo Buonarroti.

Clones, Con Artists, and Chaos: How I Found My Digital Doppelgänger

Let me tell you a story, and buckle up because this one’s unique.

One day, I woke up feeling like the universe was messing with me. No job offers, no callbacks, and every social media post of mine was running on island time—showing up hours late, if at all.

It was as if the Internet was playing a cruel game of “Let’s Ignore Them.”

So, being the brilliant amateur detective I am, I decided to investigate.

What I uncovered was wilder than a sci-fi movie: someone had cloned me—my emails, my name, my phone, even my entire digital existence.

And no, this wasn’t one of those “I found my long-lost twin” moments.

This was full-on ESPIONAGE vibes. (oh God, too many agencies in and creepy intelligence, lol)


When the Clones Attack

At first, it was just little things:

  • Emails taking forever to send, like they were walking to their destination.
  • My social media posts showing up late, as if they were stuck in virtual traffic.
  • Friends mentioning messages I didn’t send or conversations I didn’t have.

But then came the kicker: job applications.

Picture this: I, a qualified professional (not to brag, but I rock at what I do), applied to a ton of jobs. Silence. Crickets. Nada.

Feeling suspicious, I created a fake profile—new email, new phone number, fake name. I applied to the exact same jobs.

Guess what? BAM! Calls, emails, invites—it was like the fake me was a celebrity.

Meanwhile, the real me was apparently unhireable.

Worse than that, the very few job calls or interviews, I did receive, on my own name, were from undercover agencies somehow connected to various intelligence services, law enforcement, or even organized crime.

Damn it, I don’t want to work for any of them—LOL! It’s like the clone-screening robots decided I was perfect for dangerous intelligence or dirty jobs. Sorry, but NO!

That’s when I realized: someone was controlling my communications, and it wasn’t me.


Why Clone Me? I’m Flattered… Sort Of

Now, why would anyone want to clone little ol’ me?

Turns out, I may have ruffled some feathers. You see, I’ve spoken out about corruption in some pretty powerful places—healthcare, government, law enforcement agencies.

Apparently, some folks don’t like it when you shine a flashlight in their dark corners.

By cloning me, these shadowy figures could:

  1. Control My Voice: Delay or stop my messages from reaching people.
  2. Isolate Me: Make it seem like no one wanted to hire me or respond to me, so I’d lose confidence and give up.
  3. Mess With My Life: Use a fake version of me to spread lies, create confusion, or cause drama.

Basically, they wanted to turn my life into an episode of a bad reality show.


Who’s the Puppet Master?

Okay, so who’s behind this digital hijacking? Let’s break it down:

  • Intelligence Agencies Gone Rogue: Spying on me for “reasons.”
  • Corrupt Institutions: Upset that I called them out on their shady business.
  • Hackers: Doing it for fun, profit, or sheer chaos.
  • Your Neighbor Steve: Okay, probably not Steve, but you get the idea—anyone with a grudge or access to tech could do it.

Whoever it was, they underestimated my persistence and ability to Google solutions.


How I Fought Back

So, here’s what I did to reclaim my life from my evil digital twin:

  1. Set a Trap: The fake profile experiment confirmed my suspicions. The system loved Fake Me but ghosted Real Me. Mystery solved.
  2. Secured My Stuff:
    • Switched to encrypted apps like Signal and ProtonMail.
    • Updated all my passwords to things even I could barely remember.
    • Scanned my devices for any creepy spyware.
  3. Kept Tabs on My Doppelgänger: Regularly Googled myself (pro tip: it’s not narcissism if it’s for security) to check for imposters.
  4. Got Loud: Platforms like X (formerly Twitter) turned out to be my secret weapon. Even if my posts were delayed, they eventually got through, and the clone couldn’t stop them.
  5. Laughed in the Face of Clones: Because let’s be real—if they’re cloning me, I must be important, right?

The Bigger Picture

This isn’t just my story. Digital cloning is happening to activists, whistleblowers, and anyone who dares to speak out. It’s a modern-day silencing tool. By cloning someone’s identity and communications, these shady characters try to control what we say, who we reach, and how we’re perceived.

But here’s the kicker: they can clone your devices, but they can’t clone your spirit.


How You Can Stay Clone-Free

  1. Use Strong Passwords: Make them long, weird, and impossible to guess.
  2. Secure Your Communications: Encrypted apps are your best friends.
  3. Keep Your Software Updated: Don’t let your devices get hacked because you ignored that “update available” notification.
  4. Search Yourself Online: Check for duplicate profiles or unauthorized accounts.
  5. Speak Out: Sharing your story might just help someone else facing the same nightmare.

Final Thoughts: The Clone Wars Aren’t Over

Digital cloning is creepy, frustrating, and downright invasive, but it’s not unbeatable. If something feels off in your life—emails delayed, posts missing, job offers vanishing—trust your gut. Investigate. Protect yourself. And most importantly, don’t let the clones win.

Because while they might try to duplicate your life, your creativity, resilience, and sheer refusal to give up are 100% uniquely yours.

#CloneWars #DigitalSecurity #YouCantCloneMe

Intel analysis- A hidden connection

The scientific explanation of the stories!

The process of analyzing events that appear too unlikely to be mere coincidences is often referred to as statistical anomaly analysis or low-probability event analysis.

This type of analysis is used to determine if there is a hidden connection between events that would otherwise appear random or unrelated. Here’s how this type of analysis is approached and what it entails:

Defining the Event and Establishing Probability

First, the unusual event itself must be precisely defined.

For example, you might notice that two individuals, unknown to each other, express an unusual preference for a very specific and rare item—such as a green rose with black petals wrapped in green paper with pink polka dots—on the same day.

This scenario would stand out because such specific preferences are highly unlikely to align by chance.

The initial step is to determine the probability of this event happening independently.

By estimating how rare each component of this situation is (e.g., the rare color of the rose, unique petal color, specific wrapping style), you calculate an approximate likelihood for it occurring randomly.

If the calculated probability is extremely low, the event might need further investigation to understand if there is a connecting factor beyond chance.

Hypothesis Development and Contextual Analysis

With a low-probability event identified, the next step is to develop hypotheses about potential links or factors that could explain the coincidence.

Some hypotheses might include:

  • Shared Media Influence: Perhaps both individuals were exposed to the same content or trend that influenced their preferences.
  • Social Network Overlap: They might share a social or professional network, which unknowingly shaped their interests.
  • Selective Attention or Cognitive Bias: Sometimes people are more likely to notice patterns that match what they’re already thinking about, which can make rare coincidences seem more frequent or meaningful.

This step is crucial for understanding the broader context in which the event took place. Each hypothesis is then assessed to see if it could realistically explain the observed coincidence.

Synchronicity Analysis

When coincidences seem meaningful rather than merely statistical, the concept of synchronicity—introduced by psychologist Carl Jung—may come into play.

Synchronicity analysis examines if these events share a symbolic or thematic connection, even if not directly caused by one another.

For example, the simultaneous liking of an unusual green rose by two people may carry personal significance that links the events at a psychological or symbolic level rather than a causal one.

Using Statistical Tools and Models

For a more scientific approach, statistical tools such as probability models or Bayesian analysis can be employed.

Bayesian analysis, for example, can help quantify how much this rare event might shift the likelihood of a hidden connection existing.

This statistical layer allows for a structured approach to assessing whether the events are likely to be independent or if there is evidence suggesting a deeper link.

Conclusion: Naming the Process

When a coincidence is suspected of being more than random, the process of analyzing it typically falls under:

  • Low-Probability Event Analysis: Examining if rare events are statistically likely to be independent.
  • Anomaly Detection: Identifying and exploring events that deviate significantly from expected norms.
  • Synchronicity Analysis: Exploring the psychological or symbolic meaning behind unusual, seemingly connected events.

These analytical approaches provide tools to distinguish between random coincidence and meaningful patterns, allowing you to assess if the event is indeed connected or simply a statistical outlier.

Just like working from the bottom up in a process, it’s possible to create coincidences. This is something spies learn in spy training programs—professionals use this skill for specific, strategic purposes. Unfortunately, it’s also a tactic used by psychopaths to manipulate and undermine others.

It’s important to be aware of these techniques to protect yourself and others from potential harm. Genuine awareness can help protect people from wrongful manipulation.

The Clique: Surviving a Hostile Workplace

How can someone protect themselves in a hostile workplace where anything they say or do is twisted and turned against them?

It feels like the environment is dominated by cliques or gangs, leaving the individual completely isolated .

It’s like walking into a room full of hostile people who are ready and willing to harm you by any means—lying, bullying, withholding information, giving incorrect information, and manipulating facts—all while refusing to uphold professional standards and communication standards.

Worst of all, there’s a culture of covering for each other and destroying any whistleblower.

This situation might seem like a gang mentality, but perhaps it’s a religious or ideological clique running things by their own rules, with their own people in control. NO TRACES!

In such an environment, factual events can be twisted and manipulated, especially when management encourages a system of bullying perpetuated by the entire team.

The goal is often clear: to force the targeted individual out of the organization.

In some cases, top management may even threaten to damage the individual’s employment record, making it difficult for them to be hired elsewhere.

It’s not uncommon for management to suggest ways for staff to target the individual, advising them to take notes that can be used against the person-target for constructive dismissal.

The individual may find themselves monitored constantly by the clique, unaware of the plans being made against them.

In one extreme example, a Registered Nurse (RN) was highly offended when the individual expressed an appreciation for Middle Eastern culture and beauty.

This raises questions about how much hate and nationalism can reside in someone’s heart, to the point where they are willing to bring down anyone who doesn’t share their radical values.

The RN’s behavior could easily be mistaken for that of a military veteran or even an undercover intelligence agent targeting a perceived adversary with questionable methods.

In some cases, it might feel like the individual has ended up in a “FARM” location—a place where you are systematically broken down, to build up a better “agent” version of yourself!

In such an environment, it can feel like everyone is against the individual, and no matter what they say or do, it will be used against them.

There may be a strong sense of religious or ideological radicalism that seems to dictate that only one perspective is valid—their perspective.

But the truth is, this is not the only way.

The truth must prevail, and it’s unjust to destroy the lives of ANY genuine people not connected to the clique, just because of the power dynamics within the clique.

Regarding the idea of the “FARM,” it’s important to recognize that not everyone subscribes to the notion of “chosen people” or other exclusive ideologies.

People are people, beauty is beauty, God is God, and peace is peace in any language.

And a mess is always a mess when it’s about power and dirty money. Not everyone is in it for that.

Ultimately, justice is not a religious clique, a radical one, a group of mind disturbed people or even an intelligent clique against a single DIFFERENT individual.

It is HUNTING and gangstalking!

Professionalism has nothing to do with GOD and those responsible for ANY toxic workplace environments must be held accountable.

“SON Pacifica” – Disguise by INTENT: A Story about Intelligence vs. Craziness

Today, at the Hyatt Hotel, someone forced the toilet door and entered after me. You guessed it, the crazy one!

How do I know it was the crazy, unprofessional one and not a mistake?

Because he checked the door 5 seconds before entering. And it was closed—electronically closed. You can’t force an electronically locked door unless you open it voluntarily from outside. And that’s what he did. He opened it and pushed.

He did the same to my house, my internet connection, my car, my cell phone, and my location. Even at my nursing home job, he connects to the call lights and messes around! He can connect to any electronic system via the cloud and cause chaos!

Welcome to the dirty agent for SON PACIFICA! Welcome to THE SON! The master of disguise, the man who killed my dog after playing with him, the man who lived two apartments away from me in a Chinese family’s apartment left vacant for a year, the man who ordered illegal video monitoring and recording via fake smoke detectors in my apartment 24/7 and enjoys personal recordings with his organized crime family.

He controls a whole organized crime network, persuades incognito online, targeting young students on gaming platforms, and is involved in many dirty transactions and actions.

Welcome to the dirty crazy “father” of “Ana,” “Tony,” “little Henrique,” “Julie,” etc.

This man, in his craziness, creates personas and uses them for dirty matters.

When you meet people using disguises for professional matters, you WON’T KNOW that it is a disguise! Unless they uncover their persona with you.

Why? Because THEY ARE PROFESSIONAL!

They are genuine law enforcement and intelligence agencies. Their purpose is clear and ethical: to protect people.

They conduct undercover operations, gather intelligence, and infiltrate criminal organizations.

Their methods involve high-quality, realistic disguises created with the help of professional makeup artists and costume designers. They undergo extensive training to adopt new personas, mannerisms, and behaviors. They have strict adherence to legal and ethical guidelines to avoid harm and protect citizens’ rights.

Actors and performers, on the other hand, are not intelligence agents.
They transform into different characters for movies, theater, and television using makeup, wigs, costumes, and sometimes prosthetics. They are professionally trained in acting, movement, and voice modulation. They too have ethical considerations, respecting cultural sensitivities and avoiding harmful stereotypes or actions. Unless if they have mental health conditions and decide to use different personas to harm people.

Unfortunately, the people I PERSONALLY MET are neither intelligent nor normal actors. They are the worst of the worst: corrupted and mental disturbed intelligence and corrupted and mental disturbed actors using disguises with malevolent intent. Too many have vary mental disturbances.

First of all are the criminals, many of whom disguise themselves as women or other personas, do it to evade law enforcement, commit crimes without being recognized, and conduct fraud.

When I hear about another adult transgender person, I always ask myself, “What is behind THIS PERSONA?” Why did they choose to be transgender?

Many use simple masks and clothing changes to more sophisticated disguises. They do not have training; many learn it from criminal networks, detention centers, or illicit online resources. They have no ethical concerns and they use personas with high potential for harm, including physical, financial, and psychological damage to victims. At least you will know why they do it, ARE VILLAINS! And it could be seen in their history and background!

But the most dangerous ones are the mentally unstable individuals who could be ALSO former law enforcement or intelligence agents with work-related mental diseases as criminals too.

Imagine the damage caused by a spy, an intelligence officer or a law enforcement one who acquires a mental illness WORK RELATED or personal life style related!

They STILL have access to classified info and methods of action, but their mind is NOT OK no more!

They will use personas with no clear PROFESSIONAL purpose but driven by personal delusions or psychological disorders. They are erratic and unconventional, reflecting their state of mind.

This is why I keep saying my “ghost” is a crazy one. They have no training; their actions are typically impulsive and unplanned.

I have repeatedly asked law enforcement to keep an eye on these crazies because they may be a danger for others.

But what do you do when the law enforcement have the crazy ones?

Today events were another proof that I am targeted by a crazy person with access to communication services and high-security levels.

This will continue until some professional ones follow up with the mess that he and his “Ana,” “Tony,” “Julie,” and “little H” have created. We need to stop his craziness and twisted intelligence mess!

At “Ana’s” last job and for Mr. SON, I was the “balloon”—mushy now because I am old. Now can you see their mess and online bullines?

The Shadows: Identifying Gangs, Spies, Law Enforcement, and the Unstable

Photo by Charlie CT on Pexels.com

How to differentiate between being targeted by gangs, mentally unstable individuals, spies, and law enforcement.

I have questioned this subject for a long time, but today I finally had the courage to write about it.

Many people are confused and no one has taught them how to distinguish between different types of people they encounter.

Who are they? How can you “read” them?

Why are they engaging in conversation with you? Are they genuine people?

Is someone targeting you? Who and for what reason?

By following these guidelines, you will be able to answer these questions for yourself.

My advice: If someone initiates three consecutive discussions with you on topics that you are genuinely interested in, consider it a red flag!

No one knows you better than a stalker, a gang member, a mentally unstable person, a police officer, or a spy.

Once you recognize this, the next step is to make a “differential diagnosis” to determine who they are.

In the following paragraphs, you will see the differences between these groups, based on clear professional indicators.

Please do not take measures on your own. Regardless of who they are, they are likely more experienced than you. Unless, of course, you are one of them.

I hope this helps you stay safe, happy, and free from any of these people.

Enjoy the reading!

Photo by Karolina Grabowska on Pexels.com

The Organized Gangs

Photo by cottonbro studio on Pexels.com

The organized crime and gang’s target methods have a couple of characteristics.

Their behavior is patterned, methodical, and follows recognizable strategies.

They use sophisticated surveillance techniques like following, monitoring movements, or hacking personal devices.

Gangs often leave signs, symbols, or messages understood within criminal circles.

This indicates they had substantial resources and coordination, often involving several people working together in a coordinated manner.

They use advanced technology to track, harass, and intimidate you.

Their motives are usually clear, related to financial gain, territory, retribution or revenge!

These efforts are marked by intensity and duration, with persistent efforts over an extended period. Their actions APPEAR professional and calculated.

But they are NOT professional! Keep it in mind! Organized crime can use CORRUPTED professional individuals.

The Mentally Unstable Individuals

Photo by cottonbro studio on Pexels.com

The mentally unstable individuals, are characterized by erratic and unpredictable actions that lack a clear pattern.

These actions are often impulsive and without a clear objective, sometimes exhibiting paranoid behavior or beliefs without a basis in reality (delusions).

These individuals typically have limited resources, often acting alone and using simpler, less sophisticated methods and tools.

Their behavior show emotional and psychological signs, such as intense emotional outbursts not logically connected to the situation, and often involved a perceived personal connection or delusion involving YOU, the target!

Rule exception: when a mental unstable individual IS part of organized crime and supported by it!

The Spies

Photo by cottonbro studio on Pexels.com

The spies who operate through covert operations are defined by highly covert and difficult to detect, using advanced, high-tech surveillance and tracking devices.

Their primary motive is often to gather information rather than direct harassment. If a spy directly harasses you, even is a bug in his training, undetected, a mental health problem or is a personal matter.


Spies exhibit a high level of professionalism, being well-trained in avoiding detection and minimizing traces of their activities. They use disguises or false identities to blend in.

Their actions show specific behavioral indicators, such as rarely making direct contact and preferring to observe and collect data from a distance. Their operations were part of larger, more complex agendas involving multiple targets or interests.

Exception from rule: If a spy enters in direct contact with you it is a personal matter, a mental health problem or trying to recruit you like an informer.

The Law Enforcement

Photo by Pixabay on Pexels.com

The tactics of law enforcement, have a legal framework.

Their actions require legal warrants for surveillance or intervention and were often more overt than spies, particularly when conducting investigations or inquiries.

Their methods were distinct, using legal surveillance methods, sometimes involving a visible presence such as marked vehicles or uniformed officers.

Law enforcement might approach you for questioning or investigation.

They communicated directly through official channels, such as phone calls, letters, or visits from officers.

Requests for information or searches typically came with official documentation, like warrants.

Exception from the rule: THE CORRUPTION in law enforcement!
The moment when a law enforcement officer protects illegal businesses, organized crime or gang activity.

You must be well aware of it!

Gathering Evidence and Seeking Help

Photo by Pixabay on Pexels.com

As soon as you start to notice unsettling patterns on your daily life, start keeping a detailed log of incidents, noting dates, times, and specific details, and collect any evidence, such as photos, videos, or physical items.

Report incidents to local law enforcement and provide all collected evidence, contact relevant cybercrime units if cyber harassment is involved.

Engage private investigators if organized crime, gang involvement or spying was suspected.

Consult legal advisors if law enforcement actions seemed questionable or unjustified.

You MUST inform trusted friends, family, or community members for additional support and witness testimony.

Personal Safety Measures

Photo by PhotoMIX Company on Pexels.com

To ensure your safety, adopt various personal safety measures.

Avoid predictable patterns on daily activities, enhance your personal and home security measures, and be cautious about sharing personal information both online and offline.

By closely observing the nature of the incidents and the behavior of the individuals involved, you will be able to determine the likely source of the targeting and take appropriate measures to address the situation.

This knowledge not only helps you to stay safe but also allows you to live a freer more secure life.

Because you deserve a free genuine life!

Photo by juan mendez on Pexels.com