#they have proof with emails and call logs
Explore tagged Tumblr posts
Text
I am you - Part 1 of 2 (Doppelganger story)
They always assume they would notice, that if something like this happened to them, it would be immediate and undeniable. People believe in dramatic revelations, in a single moment where the world tilts and the truth is exposed. They think of flickering shadows, distorted reflections, the impossibility of seeing their own face in places they do not remember being. But it never happens that way.
The process is slow, deliberate, and inevitable. A shift so gradual that, by the time they recognize it, it is already too late. It begins with something small—an exchanged greeting they cannot recall, a casual reference to an event they have no memory of attending. They assume it is stress, distraction, miscommunication, all reasonable things that allow them to dismiss the wrongness before it settles in. They do not understand that every moment of doubt is another step in the process.
I have been here for weeks. I know the way he moves, the cadence of his voice, the weight of his name. I have studied him long enough that I could be him better than he is. And soon, I will be.
______________________________________________________________
The first time he notices, it is so minor that he almost forgets it entirely. The barista in the café hands him his coffee and smiles as she says, “Back again?” He hesitates, shakes his head slightly, and tells her this is his first coffee of the day. She frowns for a fraction of a second before laughing it off, blaming her mistake on the early morning rush.
The second time, it is more difficult to ignore. A colleague stops him outside his office, asking how his meeting went. There is a note of expectation in their voice, something that tells him this is not a casual inquiry but a follow-up to an earlier discussion—one that, as far as he is concerned, never happened.
“I didn’t have a meeting this morning,” he says, forcing an easy tone into his voice.
His colleague raises an eyebrow, pulling out their phone. “You said you were heading to one just before lunch. Look—" They turn the screen toward him, showing a text message from his number. The words are familiar, structured exactly the way he would phrase them. He reads them over and over, but the memory of sending them does not come.
That should have been the moment he acknowledged that something was wrong.
But it wasn’t.
______________________________________________________________
Denial is powerful. Even now, as the weight of inconsistencies begins to settle, he fights it. He checks his emails, his call logs, his purchase history, looking for proof that something is missing, something altered. The problem is, there is nothing missing. There are no blank spaces, no files erased or conversations removed. Instead, there are things he has no recollection of doing—transactions at places he has not visited, messages that sound exactly like him, plans he would have made.
He tells himself it is stress, that he must have been distracted, that memory is unreliable. He does not realize that he is not looking for an answer. He is looking for permission to believe nothing is wrong.
That is why he watches the security footage. That is why he asks the night guard to rewind the tape, just to check. That is why, even before he sees it, he knows what will be there.
The screen flickers, and there he is, walking into the office building at 11:42 PM. He watches himself take the elevator to the fourth floor, swipe his access card, and step inside. There is no hesitation in his movements, no moment of doubt or pause. His posture is relaxed, his gait smooth and familiar.
The guard chuckles beside him. “Looks like you’ve been sleepwalking.”
He stares at the footage, waiting for some sign that it isn’t real, that there has been a mistake. But there is no mistake. He was home at 11:42 PM. He knows this with absolute certainty. And yet, here he is, caught in a moment that should not exist.
Sleepwalking.
It is easier to agree than to argue.
______________________________________________________________
The moment of realization, the true breaking point, is not in what he sees but in what he does not.
His phone registers calls he cannot remember, but they are to the same people he speaks to every day. His emails contain correspondence that follows his usual habits, his tone, his way of phrasing things. Even his bank records show nothing unusual—just a life continuing as it always has, perfectly ordinary, except for the quiet, insidious knowledge that it is no longer his.
The key doesn’t turn.
He frowns, tries again, pressing harder, but the lock doesn’t move. He checks the key, turning it over in his palm, but nothing is wrong.
Behind him, footsteps. A voice follows.
“Something wrong?”
He turns. The landlord is walking up, a small ring of spares already in hand. He barely glances at the door.
“My key isn’t working,” he says.
The landlord exhales, already sorting through the keys. “Yeah, had the locks changed this morning. Request came in from you a couple of days ago.” He slides a key free, presses it into his palm without hesitation. “Here. Just don’t lose this one.”
He stares at it.
“Why were they changed?”
The landlord shifts his weight slightly, giving him an odd look before shaking his head. “You tell me. You put in the request.” His tone is flat, uninterested, already moving past the conversation.
His fingers tighten around the key.
"Am I being charged for this?"
A shrug. “Yeah. Standard fee.” The landlord is already moving away.
The key will fit. It will turn.
I already have mine.
Something inside him lurches at the exchange. The way the landlord handed over the key without hesitation. The way there was no moment of doubt, no pause, no verification—just a decision that had already been made.
And then he sees me.
Standing at the end of the street.
18 notes
·
View notes
Text
In 2022 I wrote an op-ed for NBC News Think about leg hair, of all things. The piece detailed a monthlong experiment during which I stopped shaving. Aside from one paragraph about bodily autonomy and Roe v. Wade, I thought it was a mild article. Boring, even.
The internet disagreed. Within an hour of publication, I started getting angry, all-caps emails. Then it started on Twitter. I was called everything from stupid and self-absorbed to a Sasquatch. I was accused of hating men and pressuring women.
The deluge lasted nearly two weeks. By the end of it, I had dozens of nasty emails, nearly a thousand social media notifications, and zero idea how to handle what I’d experienced.
Unfortunately, these instances of online harassment are becoming more common. In 2021, the Pew Research Center reported that 41 percent of US adults had experienced online harassment; the Anti-Defamation League reported an increase to 52 percent in 2023. Public and semipublic figures are especially at risk, as noted by recent studies on American journalists, Zimbabwean journalists, and female members of parliament in Sweden.
But the truth is, on social media anyone with an account can experience harassment. Here’s what to do if it happens to you.
Document Everything
Knee-deep in hate mail, I reached out to a former thesis adviser who’d written op-eds. How had he handled the trolls?
His reply: Document everything. If you have to report the harassment to a social platform or to law enforcement, you will need a body of evidence that proves the harassment.
Save the nasty emails in a special folder, either manually or by using keywords to filter and route all of the relevant mail automatically.
On social media, screenshot what people say. Doing this gives you lasting digital proof, which is important if the trolling comments disappear later on, either because the trolls deleted them or because someone reported the comments, which led to them being removed. Save all of these screenshots in a folder that can easily be shared with anyone investigating your harassment.
Documenting harassment is common advice, featured in resources ranging from writing-specific organizations like PEN America to wider organizations like the University of Chicago and the National Network to End Domestic Violence.
Don’t Respond
Another common piece of advice is “don’t feed the trolls.” In theory, if you don’t react to harassment, the trolls get bored and leave. Some have argued that this advice has failed us, as it puts the onus on the victim to stop the cyberbullying; it suggests that it’s not the trolls who need to stop but rather the victim who needs to turn the other cheek.
This is a fair critique; social media platforms should build better moderation systems and restrict users who breach standards on harassment. Ideally, events like the 2024 child safety hearing before US Congress will lead to changes that make the internet safer for everyone. In a perfect world, the onus is on Big Tech.
But internet safety is a work in progress, and in the meantime it’s on us to decide how we want to respond. Many of the accounts spamming me were obvious trolls. They had incendiary usernames and profile pictures. Looking at their comments, which were antagonistic at best, I knew I wouldn’t change their minds by responding. Nothing I could write would make them consider my point of view.
So I followed the American Psychological Association’s advice and let the storm pass. I logged off social media and routed the nasty emails into a special folder, out of sight. I spent my energy on things I enjoyed instead, no trolls involved.
Or Maybe Do Respond
Walking away isn’t the best option for everyone. If you choose to respond, there are both indirect and direct ways to address harassment. The former could include muting threads or blocking accounts. You could also report comments or users for behaviors that breach community standards, such as hate speech, threats, and bullying (which most platforms claim to prohibit). These options may prevent the same trolls from harassing you, or another user, in the future.
If you feel safe and want to respond directly, consider counterspeech, a strategy that addresses and undermines hate by redirecting the conversation in a constructive way. Some choose to reclaim hashtags, such as the K-pop stans who in 2020 flooded the #WhiteLivesMatter hashtag with K-pop videos.
Others create larger discussions around hateful posts, typically focusing not on the troll but on the content of their argument (so, not “You’re sexist” but “Saying XYZ is problematic because …”). This is exactly what I did, some six months after my experience, when I wrote about hate mail for HuffPost, focusing on sexism and the importance of dismantling it. Reframing the conversation helped me feel less powerless.
Though organizations like the United Nations recommend counterspeech, some research has suggested that it may be ineffective: While a 2021 study on anti-Asian hate found that counterspeech discouraged hate, another study on racism and homophobia saw mixed results.
Do Something You Enjoy
Whether or not you respond, give yourself time to work through your feelings. Do something you enjoy, like going to the gym, meditating, or playing your favorite video game. Anything goes!
Social support, in particular, is important for processing your experiences. This is because one of the goals of online harassment is to make you feel isolated; intentionally enjoying time with loved ones can combat this. An older 2014 study noted that social support can come from anyone in your life, ranging from your peers to your family. More recently, a 2020 study listed the myriad benefits of social support for those experiencing bullying, including increased confidence and decreased anxiety.
So text your friends and coworkers. Make dinner plans with family. Rant to your partner—or ask for a distraction. Any and all of these can help you feel less alone. You can also seek professional advice via a therapist or a cyberbullying hotline.
If you decide to take an extended break from the internet, ask a friend you trust to keep an eye on your social accounts. They can continue to take screenshots of new harassment and notify you if the frequency of incidents increases.
If the Harassment Escalates
If rude comments turn into stalking, hacking, doxing, or death threats, it’s time to contact the authorities and get legal assistance. Continue to document everything; you’ll want a body of proof to ensure you’re taken seriously. If you’re in immediate danger, call emergency services.
Practicing good cyber hygiene can help you protect your information. To deter hackers, use strong passwords, which are longer than 16 characters and include numbers and special characters. Don’t reuse passwords, and set up multifactor authentication to ensure that you’re notified if someone tries to log in to your account.
To deter doxing, stalking, and further harassment, adjust your privacy settings on social media. If possible, set your accounts to private until the storm passes. Also, depending on the platform, you should be able to limit the ability to reply to your posts so that only people you follow can republish your posts or leave comments. You can also just disallow comments entirely. If you have both professional and personal accounts, keep them separate so that work-related harassment is less likely to follow you home.
You may want to limit who can see your location data on social media, since many platforms tag every post with geolocation data unless you opt out. This is usually something you can turn off in your profiles’ privacy settings. Additionally, browser extensions like Privacy Party can help you keep your privacy settings on social media up to date automatically, so you don't have to think about it.
If things get so bad that you feel it's safest to minimize or erase your digital footprint, paid services like Delete Me can remove identifying information like your address, phone number, and social media activity from hundreds of online databases and data brokers. This makes it much harder for people to uncover this information in web searches. Services like Tweet Delete can automatically delete years worth of social media posts, replies, and likes—either wholesale or within a specific range—from your accounts.
Online harassment can be isolating and terrifying, but with a plan, you’ll be prepared to respond—and to mitigate its impacts on your life.
39 notes
·
View notes
Text
we actually almost got my step mom in legal trouble after she like left my dad i caught her signing on facebook and messaging one of my friends pretending to be me. because she started texting him literally while i had our dms open, and she literally responded with "yaaaaaaas (purple heart)" and i was like HUH? HM? WHAT? WHAT? SORRY I DIDNT SEND THAT. and i deleted the chat on impulse (sad. no proof) and checked the facebook log ins and sure enough her ip was there. when my dad confronted her over email she said she did it because i was threatening to kill her and her son (again. something she was constantly saying that i was planning to do) and that she was just trying to collect proof and that i was calling her over and over on a burner phone. which my dad obviously knew i didnt have because he had like a hawk eye on me at that period of time due to recent hospitalizations. she also said she knew the burner phone was me because it was under the name "michael" every time i called, but the thing is she shouldn't have even known i was going by that name because i was only going by it privately with my friends. she incriminated herself.
3 notes
·
View notes
Text
Navy Recruitment Result: Everything You Need to Know
Joining the military is a dream for many people searching for to serve their united states, gain valuable skills, and enjoy a disciplined and adventurous way of life. The recruitment system is rigorous and includes multiple levels, which includes written tests, bodily exams, clinical examinations, and interviews. Once those stages are completed, candidates eagerly await their military recruitment consequences. In this newsletter, we will discover the navy recruitment end result procedure, how to test outcomes, elements affecting selection, and what comes subsequent for a success applicants.
Official website for Navy recruitment result download
Understanding the Navy Recruitment Process
The army recruitment manner is designed to choose the most capable applicants. It involves several tiers:
Notification and Application
The military releases legitimate recruitment notifications detailing eligibility standards, utility dates, and choice approaches.
Candidates submit their packages online or offline in the designated time-frame.
Written Examination
Most military recruitment drives encompass a written exam protecting subjects like Mathematics, General Knowledge, Science, and English.
The examination assesses a candidate’s aptitude and information applicable to naval service.
Physical Fitness Test (PFT)
Candidates who skip the written examination ought to undergo a physical health check.
The check typically includes strolling, push-ups, sit-ups, and different endurance sporting activities to determine bodily fitness ranges.
Medical Examination
A thorough clinical take a look at-up is performed to ensure applicants meet the desired scientific standards.
Any medical conditions that would intervene with naval obligations may additionally cause disqualification.
Interview and Document Verification
Candidates who clean the preceding degrees are called for an interview.
Documents together with academic certificates, identification proofs, and caste certificates (if relevant) are demonstrated.
Final Merit List and Training
Based on usual overall performance, a final advantage listing is prepared.
Selected candidates are sent to naval training academies to start their adventure in the military.
How to Check Navy Recruitment Results
Once all stages are finished, the navy recruitment result is released via diverse official channels. Here’s how applicants can test their consequences:
Official Website
The number one supply for recruitment results is the professional army recruitment website.
Candidates ought to log in with their registration info to access their results.
Email and SMS Notifications
Some recruitment our bodies send end result notifications thru electronic mail or SMS to applicants.
It is essential to provide correct contact information all through the software manner.
Employment News and Newspapers
Results will also be posted in main employment newspapers and regional courses.
Recruitment Offices and Help Desks
Candidates can go to the closest army recruitment office to inquire about their effects.
Factors Affecting Selection in Navy Recruitment
Not all applicants who follow are selected. Several elements affect the selection system:
Performance in Written Examination
Scoring high marks within the written test will increase the probabilities of selection.
Physical Fitness Levels
Candidates should meet the desired health standards.
Poor bodily performance may cause disqualification.
Medical Standards Compliance
Candidates have to be in accurate health with none scientific conditions that restrict naval service.
Availability of Vacancies
The variety of available positions plays a position in figuring out how many applicants are selected.
Background Verification and Discipline
A smooth historical past and disciplined behavior are critical for choice.
What Comes Next for Selected Candidates?
If a candidate’s name appears within the final merit listing, they ought to prepare for the following steps:
Joining Letter and Training Instructions
Selected candidates acquire a joining letter with details in their schooling agenda and reporting date.
Reporting at Training Center
Candidates need to file to their assigned training center on the desired date.
Induction and Orientation
New recruits go through orientation packages to familiarize them with naval lifestyles.
Basic Training
Training consists of bodily conditioning, naval drills, swimming, technical training, and educational guides.
Specialization Training
After primary training, recruits may additionally undergo specialised education based totally on their roles within the army.
2 notes
·
View notes
Text
Tonight is the first night of Chanukah, and I have decided that to “celebrate” I will be contacting my representatives every day for the next 8 days to call for a permanent ceasefire in Palestine, and I urge you to do the same. There are countless easily accessible templates for emails, phone calls, and letters that take less than 5 minutes to complete and put pressure on our reps, who are aiding and abetting a literal genocide. If you are able, you can also donate to reputable esim providers (the Cartoonist Cooperative has really easy links, and you can get art) to keep people connected thru internet blackouts
As incentive, I am offering a fullbody colored sketch to anyone who chooses to dm me after these 8 days with proof of contact with their reps (dated screenshots of emails, dated call logs, etc. just nothing with your personal info). This is not a large scale, highly organized project; this is just an option that hopefully inspires you to take consistent action.
I think there is a horrible irony in the Zionist love of Chanukah; how can you see yourself represented in a story about standing against oppressors and still enact the same violent oppression against those you deem lesser. You are not a hero, you are not brave, you are a coward laughing as people are murdered in your name, and your memory will only bring shame
The real bravery is that of the Palestinian people, who despite the odds stacked against them continue to survive. This is far more in the spirit of a holiday about resistance than a celebration of genocide will ever be.
We will not be silent. We will not give up on the people of Palestine. They will survive and be free.
I hope this is clear enough to make sense to people, please feel free to let me know any questions/concerns you may have. Chag sameach
#idk if this makes any sense at all but yeah#hopefully everyone has already been in contact with reps but maybe this will inspire some specific action for some people#and again this isn’t wide scale it’s just me it’s not a big organized thing so just lmk if u have questions
18 notes
·
View notes
Text
Breaking Customer Promises and The Harms of Online Business
I ordered a laptop from BestBuy on sale. The next day, I received an email that the order was cancelled. I pulled up a chat to ask why exactly my order was cancelled.
They don't deliver to hotels.
Okay. Sure.
I asked if I could change the address to my work place and was told to fully re-order everything and I would receive a refund for the post-sale price difference. Okay. Sure.
I received the laptop, and it wouldn't turn on.
I took it to my nearest BestBuy. They swap it out easy as pie. I think to myself, "I should've just gone here from the beginning."
Ah, but no matter. I have a laptop and it works great!
I wait a week. No refund. I call them. They assure me, I'll receive an e-mail with the refund in 48-72 hours. Okay. Sure.
I wait another week, just to give them space to process the influx of end of year orders. No refund. I call them again. "The billing cycle takes a month," they tell me, "the refund will come in around 30 days."
Okay. Sure.
It's been four months, friends, and I finally reach out again. Armed with my case ID number, three BestBuy supplied chat logs of customer service agents promising me my refund, a free day and a whole lot of righteous fury. How could they deny me this? I explain all of this to John, the customer service agent. And what does he say to me?
"Sorry to hear this, it is very disappointing, however I will try to resolve your issue as soon as possible. I would like to inform you that, we do not have an option to honor the price match for the old price for canceled order."
…What? Excuse me? I explain again, "They've all told me differently. I have evidence of your company representatives promising me this refund."
"I’m truly sorry to hear about your experience and I’m sorry you are having to face this issue. Please accept our sincere apology for the inconvenience caused and incorrect information provided by previous agent. As it is canceled order we do not have an option to honor the previous sale price." John tells me, merciless.
But it wasn't just one agent, I argue. I have proof. They all told me the same thing. So, I Karen. I admit it, I tell him, "Let me speak to a supervisor."
"I can surely arrange for a supervisor, but I want to let you know that I've thoroughly investigated all potential solutions in this situation. Believe me, if there were any available options to provide you with refund, I would have already taken care of it. Getting a supervisor wouldn't have been necessary since I've already explored this option on your behalf." John tells me.
And here's the thing, friends, I do believe him. He doesn't seem like a bad guy, even though he's complicit in stealing money from me, but in the words of an anachronistic Anne Boleyn, like what was I supposed to do? What's the worst thing that can happen, John, if I ask to speak to your manager? Explain it to me.
Is it a waste of my time? Four months after the theft occurred, to chase down $430 like some cadaver dog sniffing up and down a river after the frost melted to see if I can pick up on a trail? After four months, will one more conversation, one more long shot, really be the straw that breaks my back?? At worst, what will happen, John? Will I waste more company time? Good. I hope I waste at least $430 of company time. Frankly, I hope I waste more.
A supervisor is reviewing the chat logs now before they get back to me. They're a floor supervisor, but they didn't provide a name. Pray for me, friends.
#best buy#customer service hell#customer experience#i wrote all of this while the supervisor is back reading#i don't think i'm getting a refund guys
2 notes
·
View notes
Text
I’m about to start keeping a running log of work calls. I can’t with these people today.
So far:
Call 1: called wrong department checking on the status of an order they didn’t pay for yet.
Call 2: another person cheated by the unfair shift of RGB to CMYK who wanted us to fix it immediately and ship 25 hardcover custom printed books with a one day turn around.
(Got Nam flashbacks since I just unloaded a crazy person who complained about our commercial grade print quality after comparing it to a “superior” FedEx spiral bound book that used completely different substrates. Good luck mass producing that.)
Call 3:
Them: “I’m taking a look at my proofs and I noticed the designer used the image I asked them to use. So that means I can use it, right?”
Me: *already knows where this going* “ What do you mean?”
Them: “well I found it online when I was searching Google so I assumed it’s fine to use. Since it’s in the proof now I guess that means I can use it.”
(This happens A LOT too. People assume that because they can find it on Google, it’s free use for a self-published book cover. We have to then gently explain copy and usage rights. This is after the client specifically signed an Intellectual Property Rights disclaimer prior to check out certifying they created all of the content.)
Now onto email time and brief reprieve from today’s nonsense.
4 notes
·
View notes
Text
Disney Dreamlight Valley: Dreamsnaps
So, Disney Dreamlight Valley came out with something called Dreamsnaps. It is a weekly photo submission competition to earn free moonstones. This has pro's and con's, but this was-to me-one of the first unique things this game did. But, like anything else regarding this game, there was not much explained about it.
Before we even get to the ability to do a Dreamsnap, this will start with Venellope's quest. She is glitching and you take a photo and submit it to "fix" her and that starts your dreamsnap journey.
So on Week 1, Dreamsnap Wednesday's, you get a prompt. It will either be a Decoration Challenge or an Outfit Challenge. I noticed a trend where it alternates Decor one week, then Outfit the next week. There will be 2-3 Mandatory tags you have to hit, and 2 Suggested tags. You can sort furniture or clothes by the tags. Every system has a different button for this, but I myself play on Nintendo Switch. Once you are ready to go-you take a photo and click "Submit Dreamsnap". There is also a Dreamsnap Tab in the start menu.
On Week 2, you vote for the submissions you like best. There is no limit to how many votes you cast, you will look at 2 photos and click which one you like better. The minimum amount of voting will get you 50 moonstones per week.
On Week 3, you get your results from that particular challenge in your mailbox (in game). You will get a score, based on how well you hit the mark for the mandatory/suggested tags, and a ranking based on people's votes. The rewards are varying amounts of moonstones and pixel dust. The pixel dust adds up and helps you level up from level 1 to level 10. There is a reward at every level, with a big trophy at level 10. At the time of writing this, I am at Level 9.
The catch is this is ongoing with a new challenge coming weekly. So on any given week you are voting on something, while submitting something else, while receiving the results of something else entirely. So I started keeping track of what challenge was what, the scores, and my submissions. It is possible to send the photo you are planning to submit to your phone, but you need to do so after you take it but before you submit it. Once you take a photo, there is now way to look at previous photos taken to send it to your phone. You send it by way of scanning a QR code.
Now, at the time of writing this post, and since I have been playing since the beginning of the prerelease-I have done 32 dreamsnaps. One would think that by now, I might know what I am doing? If you ask my mom, who I help each week with the submissions, I am a great dreamsnap teacher. But my scores are all over the place, so I decided to look at the numbers and see what a proper analysis would tell me.
For me, I treat every dreamsnap as if its both decor and outfit, hoping that will help my score. One of the problems is, one part of the "win" is objective and the other part of the "win" is subjective. I also have played this since the beginning, which means I have a fully decorated Valley-there is a limit on how many items you can have and I am under it but just barely, but its not like its a baren wasteland. Also, you can not have any "Touch of Magic" items in your photo. No custom creations can be seen or unseen, this goes for clothes or furniture. Having characters from the Valley in with you seems to help, you can also do different poses with different animals when in camera mode. The premium shop changes on Wednesday's as well, save up for the good stuff there.
The Proof is in the Numbers:
I logged my results on a note on my phone, emailed them to myself, and put them into a google sheet. Here is what I found:
For combined outfit/decor
I average a 45.47 score
I average a 56,914 ranking
I average 554 moonstones
I average 139 pixel dust
For Outfit alone,
I average a 48.12 score
I average a 54,096 ranking
I average 646 moonstones
I average 142 pixel dust
For Decor alone,
I average a 42.99 score
I average a 59,556 ranking
I average 468 moonstones
I average 137 pixel dust
My Best Dreamsnap:
My best submission is Winter's Here (#24). An outfit challenge, 77.59 score, 11,114 ranking, 2500 moonstones, and 178 pixels.
My Worst Dreamsnap:
My worst submission is Arendelle's Showcase (#25). A decoration challenge, 26.72 score, 85,353 ranking, 300 moonstones, and 127 pixel dust.
Best Decoration Dreamsnap:
My best one is actually one earlier, but I was not saving them at the time. The one I can show is Holiday Cheer (#21). Decor challenge, 56.87 score, 58,567 ranking, 600 moonstones, and 157 Pixel Dust.
Worst Decoration Dreamsnap:
The worst one is It Came From Outer Space (#27). Decor Challenge, 23.85 score, 59,242 ranking, 300 moonstones, and 124 pixel dust.
Best Outfit Dreamsnap:
While my best submission ever is already posted, I will show this one that was my higest ranking one. A Day at Disney (#22). Outfit challenge, 57.46 score, 15,289 ranking, 1500 moonstones, and 158 pixel dust.
Worst Outfit Dreamsnap:
My worst one is not saved, maybe a good thing in retrospect? But I will show you Under The Sea (#20). Outfit challenge, 32.46 score, 85,575 ranking, 300 moonstones, and 133 pixel dust.
Tips:
No touch of magic items
Make sure Decor and Outfit are on point
Bring in characters
Pose with pets
Buy clothes and furniture, you never know when you are going to need what.
Pay attention to the premium shop, you never know when you could use the stuff there.
Hoard supplies to be able to make stuff at a crafting table to be able to use for photos.
Decorate the valley, within the limit.
Use all the options in the camera: poses, shot types, filters, frames.
This was an interesting dive into whether or not the system is rigged or what I could do better. If you want to look at your own scores, take a look at your mailbox. What tips and tricks would you add to this post?
#rant#gamer#gamer girl#nintendo switch#disney dreamlight valley#disney#pixabay#how to#dreamsnaps#family#camera#photo#photography#mandatory#suggested#tags#score#ranking#moonstones#pixel dust#decoration#outfit#challenge#vanellope#wreck it ralph#touch of magic#qr code#tips and tricks#premium shop
3 notes
·
View notes
Text
I realize that as an Admin my purpose in this office is to support others by doing grunt work and I am happy to do that grunt work (mailing, shipping, filing, calling, figuring out the logistics to do weird frustrating things that we haven't done before) but it comes with the expectation, nay, the hope that my colleagues who get paid SIGNIFICANTLY more than me will at least do the bare minimum of showing up or checking their emails in an 8 hours span and answering questions like "hey what's the FedEx log in since you're the only one who has it and refuses to let anyone else make use of it for some bizarre reason other than your imagined self importance and have now disappeared off the face of the earth for two months leaving me to make another FedEx business account in my own name so I can ship out proofs to the printers on time"
#it's not the missing work. it's the complete and utter lack of communication and disregard for the rest of us.#I missed lots of work this last year. I missed over 12 weeks of work. and everyone I mean everyone knew when I'd be out of office#I had three types of contingency plans available for when I'd be out of office and I'm just a f****** administrator#this woman is a coordinator for an entire department and she doesn't bother to update any calendars whatsoever#we're just left to guess when she might or might not show up and pick up the pieces and hope for the best#yes all I had to do was make an account with FedEx and mail a package and yet it took 3 hours because of FedEx's website#if she had answered her email or the DMs this could have been resolved in 20 minutes
2 notes
·
View notes
Text
out of uniform: sorry for not being around too much during the weekend. in regards to the post i made to explain some things, i decided to venture down memory lane, so to speak, about an incident mentioned in that post that i feel like the authors of the callout made about me thought that i was the sole person responsible for said incident when i wasn't. others also participated in the mess, so they are also at fault here. so this is my attempt to set things straight.
i'll discuss it further under the cut.
I've spent the past weekend combing through posts in relation to in 2011 where I've been accused of accusing someone of being a rapist, which turned out to be a false identification on someone else's part. Now, none of this is to absolve me of my involvement in the matter by trying to gather what information I could on the accused. It's here that I was, and I quote, a "dumbass plurk witch hunter" by participating in these two long-deleted plurks that, to my knowledge, have no archive elsewhere (Pastebin wasn't as commonly used back then to archive plurks for evidence down the line, and I have no idea how to search through that site to see if it's still archived, especially since the person could have set an expiration timer on it.) Again, this is just so that I can set things straight to where I wasn't the sole person responsible for this mess back in 2011.
This is the thread where I, and other people, were called a "dumbass plurk witch hunter" (playagame is one of my very old plurk accounts that has a lot of shit on it that I wish I never put out there) and the very last comment on the thread was from me saying that I did send him a PM to apologize. Evidence of this apology, though, was deleted by LiveJournal themselves because I know that I tend to not mass delete things, even if they're years old at this point. I also confirmed again, this time on my very old plurk account, that I had sent him an apology. (Please disregard the last comment I, as FREE☠JOKER made there since at the time, I had the emotional sympathy of a dumbass.) For even further proof that I apologized to him, here's a cap I took of my archived LJ post hosted on my Dreamwidth account. I am also still trying to log in to my Dropbox account where I at least have the conversation saved from Trillian and not LiveJournal.
This is the extent of my involvement where I tried to dig up information on him, but I was not the one who made the very false connection between him and the TC in question. This is from a private conversation I had with one of my friends that has known me since I was a cringy ass preteen who thought they knew everything about the world when, in fact, I knew nothing. If you'd like the full conversation for full context, then I don't mind providing it.
However, I did find these two posts from an account, whyljrpwhy, that is veritably not mine by a long shot. Whenever I made a new account, I tended to use keywords for my icons like these while whyljrpwhy uses keywords like these for their icons. That, and I've never had the email [email protected] before. I've normally used AOL, Yahoo, or Gmail for pretty much everything.
This originally was hosted on tumblr in the form of these PSAs: (this one has the link to the fandomsecrets post where the warning was crossposted here.) In the thread itself, you'll see where whyljrpwhy had some supremely bad takes in general for the whole situation that they were rightfully called out for, even when speaking to the TC that had been falsely accused of something as serious as this.
Once again, this post in no way absolves me of what I did back in 2011. I fully acknowledge what I did was wrong by trying to gather information on an individual that had nothing in common with the person being warned about, only that they both shared the alias TC. I've since tried, and still do try, my best to be the best person I can and learn from my mistakes.
Thank you, once again, for reading this post. Hopefully this is the last time I need to address this.
#☆ OUT OF UNIFORM → downtime is necessary even for a hero tasked with so much; remember to take a break for yourself.#☆ PSA → hey listen! this is some important stuff here!#( ASK TO TAG. )#*ooc: once again please don't reblog this -- I just wanted to set the record straight here#gonna still be kinda quiet but yeah -- just wanted to get that out there
2 notes
·
View notes
Text
youtube
Meet The $100 Million Underdog, Pamela Bardhi with Jay Conner, The Private Money Authority
Key Takeaways
How Pamela went from having over $100k in debt to achieving a 9-figure real estate career
Discovering why business is 100% a spiritual game
How Pamela drastically transformed her career trajectory through real estate
The life-changing power of private money to kickstart Pamela’s real estate career
Must-hear advice for attracting private money to your life
Taking the steps to map out your dream life
The importance of aligning your mind, body, and spirit
In today’s show of Real Estate Investing with Jay Conner, Pamela Bardhi joins Jay to empower the world through real estate, building different revenue streams, and igniting the Underdog in all of us.
Pamela Bardhi, the Real Estate Underdog, has been named by TIME Magazine as a Trailblazer in the Real Estate Industry. She went from delivering pizzas to a 9-figure real estate career featured in Forbes & Time Magazine by 28 years old.
She is a real estate developer by trade and has transitioned into becoming a real estate and life strategist through coaching, speaking, and building an international real estate team.
She hosts a world-renowned podcast called, Underdog, which is in the top 1.5% of podcasts in the world and streamed in 65+ countries.
She is fully dedicated to encouraging the world and igniting the fire in all of us. Real Stories, Real Hustle, Real Journeys. That is what she is all about.
Pamela has sold, developed, or acquired over $100 Million in Real Estate Assets in the Boston, MA market over the last decade. Her educational background includes Stonehill College, Babson College & Harvard Business School.
Timestamps:
0:01 – Get Ready To Be Plugged Into The Money
0:20 – Today’s guest: Pamela Bardhi
3:28 – Pamela Bardhi’s Start-Up In The Real Estate Business
6:49 – Pamela Bardhi, The Real Estate Underdog – https://www.theunderdogshow.com
9:06 – Business Is A Spiritual Game
15:21 – What Are You Most Passionate About Right Now?
18:07 – Early Struggles & Lessons Learned
20:54 – Best Ways To Raising Private Money
24:45 – Jay’s Free Private Money Guide: https://www.JayConner.com/MoneyGuide
25:58 – How To Maintain Your Drive & Motivation
30:17 – Importance of Having Multiple Streams of Income
31:59 – Connect with Pamela Bardhi – https://www.PamelaBardhi.com email: [email protected]
Private Money Academy Conference:
https://www.JaysLiveEvent.com
Free Report:
https://www.jayconner.com/MoneyReport
Join the Private Money Academy:
Have you read Jay’s new book: Where to Get The Money Now?
It is available FREE (all you pay is the shipping and handling) at
https://www.JayConner.com/Book
What is Private Money? Real Estate Investing with Jay Conner
https://www.JayConner.com/MoneyPodcast
Jay Conner is a proven real estate investment leader. He maximizes creative methods to buy and sell properties with profits averaging $67,000 per deal without using his own money or credit.
What is Real Estate Investing? Live Private Money Academy Conference
youtube
YouTube Channel
Apple Podcasts:
Facebook:
Listen to our Podcast:
#jay conner#real estate investing#real estate#private money#flipping houses#real estate investing for beginners#youtube#raising private money#privatemoney#realestate#Youtube
2 notes
·
View notes
Text
I work in IT and have some recommendations that can help prevent scams like this!
1. Never follow a direct link unless you’re 100% sure it goes where it says it will go (for example, if you just signed up for a service and it sent you a confirmation link, that’s ok because it’s one that you are expecting. Even then, I recommend hovering over the link if you’re on desktop to make sure the url matches what it says it is). If you’re not sure, go to your browser and go to the site directly instead of clicking the link.
2. Make sure everything lines up. Are there misspellings? Does the email address make sense? When you hover over the sender, does it match what it says it should be? If it’s from a certain service, should that service have access to this email account (ex: I don’t have any social media connected to my work account, so any emails from them sent there would be suspicious)? If any of this feels off, dig a bit deeper before going ahead with it.
3. If it’s a phone call from the bank/anything else that seems urgent but requires personal info to validate, call them directly. You can even save the phone number so that if you get a call from someone who isn’t that number but claims to be, you know something might be up.
3b. If it’s a message or call from a family member or friend, but is very vague/asks for personal info/requires you to click a link, contact them directly. I keep seeing these Facebook posts that friends get tagged in which are just a link to a “video” with a caption like “is this you?” Or “I can’t believe they’re gone.” If you see anything like that, definitely let the friend/family member who posted it know so they can change their passwords. This is less common, but I’ve also seen people talking about AI voice replications being used to scam people- calling and pretending to be a family member in an emergency. I’m not sure if this is something that’s actually happening or more of an urban legend, but if you do get a call like this, obviously don’t send them any money or share any personal info unless they’re able to first provide proof that they are who they say they are. Personally, if any of my family members were in an emergency, I doubt they would be asking for money or my card info.
4. Scams and phishing are built on social psychology. It’s much easier to feed off a person’s fear/stress than it is to hack into a system externally. Are you being given an urgent call to action? Is there a threat of negative consequences if you don’t act quickly? If so, you are very likely being scammed. Once again, try to access whatever it is from an external source (call/go to the website yourself) to validate whether the issue is real. Bank calling about fraudulent charges? Check your online banking app or call the bank back. Subscription is lapsing and you should renew now to get 20% off? Go to the site and see for yourself if that’s the case. Login from an unrecognized device? Go to the page, change the password and log out from all devices.
5. If you ever get a double login screen, close out of the site, retype the url and try again. If you click a link and it takes you to a login screen (I’m sure you’ve all realized the pattern here by now) go to the site directly and login from there.
6. If you’re at all concerned that you may have fallen for a scam, that’s ok! It happens! It’s time to change your passwords, logout of the service on all devices, and (if it’s a bank or something else with sensitive info) contact the service and inform them of the potential issue.
7. Trust your gut. While you may not be consciously aware that something is off, a lot of times there are cues that we pick up on without even realizing. If it seems even remotely fishy, it’s *always* better to be safe than sorry.
How I got scammed

If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2024/02/05/cyber-dunning-kruger/#swiss-cheese-security
I wuz robbed.
More specifically, I was tricked by a phone-phisher pretending to be from my bank, and he convinced me to hand over my credit-card number, then did $8,000+ worth of fraud with it before I figured out what happened. And then he tried to do it again, a week later!
Here's what happened. Over the Christmas holiday, I traveled to New Orleans. The day we landed, I hit a Chase ATM in the French Quarter for some cash, but the machine declined the transaction. Later in the day, we passed a little credit-union's ATM and I used that one instead (I bank with a one-branch credit union and generally there's no fee to use another CU's ATM).
A couple days later, I got a call from my credit union. It was a weekend, during the holiday, and the guy who called was obviously working for my little CU's after-hours fraud contractor. I'd dealt with these folks before – they service a ton of little credit unions, and generally the call quality isn't great and the staff will often make mistakes like mispronouncing my credit union's name.
That's what happened here – the guy was on a terrible VOIP line and I had to ask him to readjust his mic before I could even understand him. He mispronounced my bank's name and then asked if I'd attempted to spend $1,000 at an Apple Store in NYC that day. No, I said, and groaned inwardly. What a pain in the ass. Obviously, I'd had my ATM card skimmed – either at the Chase ATM (maybe that was why the transaction failed), or at the other credit union's ATM (it had been a very cheap looking system).
I told the guy to block my card and we started going through the tedious business of running through recent transactions, verifying my identity, and so on. It dragged on and on. These were my last hours in New Orleans, and I'd left my family at home and gone out to see some of the pre-Mardi Gras krewe celebrations and get a muffalata, and I could tell that I was going to run out of time before I finished talking to this guy.
"Look," I said, "you've got all my details, you've frozen the card. I gotta go home and meet my family and head to the airport. I'll call you back on the after-hours number once I'm through security, all right?"
He was frustrated, but that was his problem. I hung up, got my sandwich, went to the airport, and we checked in. It was total chaos: an Alaska Air 737 Max had just lost its door-plug in mid-air and every Max in every airline's fleet had been grounded, so the check in was crammed with people trying to rebook. We got through to the gate and I sat down to call the CU's after-hours line. The person on the other end told me that she could only handle lost and stolen cards, not fraud, and given that I'd already frozen the card, I should just drop by the branch on Monday to get a new card.
We flew home, and later the next day, I logged into my account and made a list of all the fraudulent transactions and printed them out, and on Monday morning, I drove to the bank to deal with all the paperwork. The folks at the CU were even more pissed than I was. The fraud that run up to more than $8,000, and if Visa refused to take it out of the merchants where the card had been used, my little credit union would have to eat the loss.
I agreed and commiserated. I also pointed out that their outsource, after-hours fraud center bore some blame here: I'd canceled the card on Saturday but most of the fraud had taken place on Sunday. Something had gone wrong.
One cool thing about banking at a tiny credit-union is that you end up talking to people who have actual authority, responsibility and agency. It turned out the the woman who was processing my fraud paperwork was a VP, and she decided to look into it. A few minutes later she came back and told me that the fraud center had no record of having called me on Saturday.
"That was the fraudster," she said.
Oh, shit. I frantically rewound my conversation, trying to figure out if this could possibly be true. I hadn't given him anything apart from some very anodyne info, like what city I live in (which is in my Wikipedia entry), my date of birth (ditto), and the last four digits of my card.
Wait a sec.
He hadn't asked for the last four digits. He'd asked for the last seven digits. At the time, I'd found that very frustrating, but now – "The first nine digits are the same for every card you issue, right?" I asked the VP.
I'd given him my entire card number.
Goddammit.
The thing is, I know a lot about fraud. I'm writing an entire series of novels about this kind of scam:
https://us.macmillan.com/books/9781250865878/thebezzle
And most summers, I go to Defcon, and I always go to the "social engineering" competitions where an audience listens as a hacker in a soundproof booth cold-calls merchants (with the owner's permission) and tries to con whoever answers the phone into giving up important information.
But I'd been conned.
Now look, I knew I could be conned. I'd been conned before, 13 years ago, by a Twitter worm that successfully phished out of my password via DM:
https://locusmag.com/2010/05/cory-doctorow-persistence-pays-parasites/
That scam had required a miracle of timing. It started the day before, when I'd reset my phone to factory defaults and reinstalled all my apps. That same day, I'd published two big online features that a lot of people were talking about. The next morning, we were late getting out of the house, so by the time my wife and I dropped the kid at daycare and went to the coffee shop, it had a long line. Rather than wait in line with me, my wife sat down to read a newspaper, and so I pulled out my phone and found a Twitter DM from a friend asking "is this you?" with a URL.
Assuming this was something to do with those articles I'd published the day before, I clicked the link and got prompted for my Twitter login again. This had been happening all day because I'd done that mobile reinstall the day before and all my stored passwords had been wiped. I entered it but the page timed out. By that time, the coffees were ready. We sat and chatted for a bit, then went our own ways.
I was on my way to the office when I checked my phone again. I had a whole string of DMs from other friends. Each one read "is this you?" and had a URL.
Oh, shit, I'd been phished.
If I hadn't reinstalled my mobile OS the day before. If I hadn't published a pair of big articles the day before. If we hadn't been late getting out the door. If we had been a little more late getting out the door (so that I'd have seen the multiple DMs, which would have tipped me off).
There's a name for this in security circles: "Swiss-cheese security." Imagine multiple slices of Swiss cheese all stacked up, the holes in one slice blocked by the slice below it. All the slices move around and every now and again, a hole opens up that goes all the way through the stack. Zap!
The fraudster who tricked me out of my credit card number had Swiss cheese security on his side. Yes, he spoofed my bank's caller ID, but that wouldn't have been enough to fool me if I hadn't been on vacation, having just used a pair of dodgy ATMs, in a hurry and distracted. If the 737 Max disaster hadn't happened that day and I'd had more time at the gate, I'd have called my bank back. If my bank didn't use a slightly crappy outsource/out-of-hours fraud center that I'd already had sub-par experiences with. If, if, if.
The next Friday night, at 5:30PM, the fraudster called me back, pretending to be the bank's after-hours center. He told me my card had been compromised again. But: I hadn't removed my card from my wallet since I'd had it replaced. Also, it was half an hour after the bank closed for the long weekend, a very fraud-friendly time. And when I told him I'd call him back and asked for the after-hours fraud number, he got very threatening and warned me that because I'd now been notified about the fraud that any losses the bank suffered after I hung up the phone without completing the fraud protocol would be billed to me. I hung up on him. He called me back immediately. I hung up on him again and put my phone into do-not-disturb.
The following Tuesday, I called my bank and spoke to their head of risk-management. I went through everything I'd figured out about the fraudsters, and she told me that credit unions across America were being hit by this scam, by fraudsters who somehow knew CU customers' phone numbers and names, and which CU they banked at. This was key: my phone number is a reasonably well-kept secret. You can get it by spending money with Equifax or another nonconsensual doxing giant, but you can't just google it or get it at any of the free services. The fact that the fraudsters knew where I banked, knew my name, and had my phone number had really caused me to let down my guard.
The risk management person and I talked about how the credit union could mitigate this attack: for example, by better-training the after-hours card-loss staff to be on the alert for calls from people who had been contacted about supposed card fraud. We also went through the confusing phone-menu that had funneled me to the wrong department when I called in, and worked through alternate wording for the menu system that would be clearer (this is the best part about banking with a small CU – you can talk directly to the responsible person and have a productive discussion!). I even convinced her to buy a ticket to next summer's Defcon to attend the social engineering competitions.
There's a leak somewhere in the CU systems' supply chain. Maybe it's Zelle, or the small number of corresponding banks that CUs rely on for SWIFT transaction forwarding. Maybe it's even those after-hours fraud/card-loss centers. But all across the USA, CU customers are getting calls with spoofed caller IDs from fraudsters who know their registered phone numbers and where they bank.
I've been mulling this over for most of a month now, and one thing has really been eating at me: the way that AI is going to make this kind of problem much worse.
Not because AI is going to commit fraud, though.
One of the truest things I know about AI is: "we're nowhere near a place where bots can steal your job, we're certainly at the point where your boss can be suckered into firing you and replacing you with a bot that fails at doing your job":
https://pluralistic.net/2024/01/15/passive-income-brainworms/#four-hour-work-week
I trusted this fraudster specifically because I knew that the outsource, out-of-hours contractors my bank uses have crummy headsets, don't know how to pronounce my bank's name, and have long-ass, tedious, and pointless standardized questionnaires they run through when taking fraud reports. All of this created cover for the fraudster, whose plausibility was enhanced by the rough edges in his pitch - they didn't raise red flags.
As this kind of fraud reporting and fraud contacting is increasingly outsourced to AI, bank customers will be conditioned to dealing with semi-automated systems that make stupid mistakes, force you to repeat yourself, ask you questions they should already know the answers to, and so on. In other words, AI will groom bank customers to be phishing victims.
This is a mistake the finance sector keeps making. 15 years ago, Ben Laurie excoriated the UK banks for their "Verified By Visa" system, which validated credit card transactions by taking users to a third party site and requiring them to re-enter parts of their password there:
https://web.archive.org/web/20090331094020/http://www.links.org/?p=591
This is exactly how a phishing attack works. As Laurie pointed out, this was the banks training their customers to be phished.
I came close to getting phished again today, as it happens. I got back from Berlin on Friday and my suitcase was damaged in transit. I've been dealing with the airline, which means I've really been dealing with their third-party, outsource luggage-damage service. They have a terrible website, their emails are incoherent, and they officiously demand the same information over and over again.
This morning, I got a scam email asking me for more information to complete my damaged luggage claim. It was a terrible email, from a noreply@ email address, and it was vague, officious, and dishearteningly bureaucratic. For just a moment, my finger hovered over the phishing link, and then I looked a little closer.
On any other day, it wouldn't have had a chance. Today – right after I had my luggage wrecked, while I'm still jetlagged, and after days of dealing with my airline's terrible outsource partner – it almost worked.
So much fraud is a Swiss-cheese attack, and while companies can't close all the holes, they can stop creating new ones.
Meanwhile, I'll continue to post about it whenever I get scammed. I find the inner workings of scams to be fascinating, and it's also important to remind people that everyone is vulnerable sometimes, and scammers are willing to try endless variations until an attack lands at just the right place, at just the right time, in just the right way. If you think you can't get scammed, that makes you especially vulnerable:
https://pluralistic.net/2023/02/24/passive-income/#swiss-cheese-security
Image: Cryteria (modified) https://commons.wikimedia.org/wiki/File:HAL9000.svg
CC BY 3.0 https://creativecommons.org/licenses/by/3.0/deed.en
10K notes
·
View notes
Text
What Happens During a Criminal Investigation by a Forensic Expert?

When a serious crime occurs, it is not only the detectives that step in; the role of a forensic expert is very significant in uncovering the truth. However, what actually happens backstage? In the simplest manner possible, let us explain the process step by step.
1. Crime Scene Is Secured and Analyzed
Once a crime is reported, the first step is to ensure that the location is safe for law enforcement—this is done by them. They need to be confident that they are not destroying forensic evidence by their movements and thus they have to preserve all potential proof. Forensic Experts come to the scene after the place is safe and secured in order to carry out a more detailed examination.
Furthermore, things like fingerprints, hair, blood stains, digital devices, clothing fibers, and even environmental elements, i.e. soil or liquids are thoroughly described and collected. This activity is called a crime scene by forensic professionals. It is of paramount importance as even the seemingly minor thing left out can give a new twist to the investigation.
In addition to regular signs of evidence, forensic professionals may use technologies that expose the invisible and hidden. Instruments such as UV light scanners, 3D scanners, or chemical tests are improving forensic technology and giving police new methods to work better, quicker, and with increased accuracy.
2. Evidence Is Sent for Scientific Examination
After obtaining every physical and digital evidence that exists, the materials are carefully packed and transported to a forensic laboratory so that they can be further examined. Professionals in different areas work on various types of evidence in order to analyze it. For example, biologists might take blood or hair samples for DNA tests, chemists could identify the substance, and digital forensic specialists could focus on electronic devices.
The progress in technology, especially the application of artificial intelligence in forensic science, has brought about a significant change in the methodology used. AI tools are now being implemented to expedite the pattern recognition process, simplify the process of fingerprint identification, and even make predictive crime analysis models.
On the one hand, biological remains will be tested for DNA profiling, toxicology, or fiber comparison. On the other hand, the digital devices are subject to rigorous Forensic Investigations, including execution of Cyber Forensic Data Recovery. The process involves accessing the copy of files that were deleted, analyzing email logs, decoding encrypted messages as well as tracing location data.
This stage known as Criminal Case Analysis is the process of evaluating and verifying electronic evidence of a Forensic Specialist. They also ensure the chain of custody is maintained, which in other words, means the data is securely handled from the point it was collected to the courtroom where it is presented.
4. Report Is Compiled and Presented in Court
Upon the completion of all examinations and checks, a detailed forensic report is pieced together by an informed official. The file contains images, technical summaries, schedules, and the expert's opinion. Then the Forensic Expert leads the evidence presentation explaining the correlation between it and the overall criminal case.
The majority of the time, expert witnesses give the judge and juror a better understanding of the complex scientific findings. The presence of witness experts has become more important, especially in those cases with digital or cyber evidence, where the use of technical language can be too much to handle.
This is the last and most critical step in a scientific approach to criminal investigations by forensic experts that leads to justice being based on trustworthy, scientifically proven outcomes. All the former measures are merged to create crystal clear evidence in court, which is the basis for a fair trial and informed decision making.
The New Challenges for Forensic Experts
The point is that the function of a Forensic Expert in Criminal Investigations is actively shifting. The spread of cyber threats in the digital sphere has led to experts' diversification of their skills. Today, they are becoming adept in fields like blockchain forensics, AI-driven crime prediction, and real-time surveillance analysis.
Moreover, the utilization of forensic cyber tools is on the rise as the number of crimes that cast the digital shadows increases. To be effective, professionals have to keep up with certifications, training, and technological developments.
Final Thoughts
Even a Criminal Investigation By Forensic Expert is not just about white lab coats and high-precision instruments of investigation — it is also an operation that is dedicated to the highest truth mission through scientific methodologies. Every single action, whether it be the crime scene analysis, the digital forensics, or the cyber evidence recovery, is a part of the big picture.
With the advancement of forensic tools, especially in the domain of AI in forensic analysis and Cyber Forensic Data Recovery, the future of crime investigation becomes even more accurate and tech-driven.
Be it the crime of passion or the cybercrime of the future, the Investigations conducted by the use of Forensic Science remain one of the key factors in modern justice systems.
#cyber forensic investigation#fire/arson investigation#Criminal Investigation By Forensic Expert#Forensic Investigations
0 notes
Text
MICHAEL'S GFL2 PROGRESS LOG OR WHATEVER #1
It has been weeks, probably months since a wrote a progress log. In case you didn't know, my PC broke down and I was too lazy to log in to my Tumblr account after reformatting it. I had like, 34 email accounts and didn't remember which one this account is linked to so I put it off until now.
Anyways, I've decided to make my posts more organized. AKA, actually making it NOT look like a mess. I switched to completely using my name Michael instead of having 2 aliases. If we've been friends/mutuals before this, I don't really mind if you call me Uvy. I just decided to stick to Michael since it makes it easier. Oh yeah, the changes include renaming my tags; which means I'm starting over. Not gonna delete my previous posts, though.
Enough of myself. Here's a rundown of my GFL2 account since launch:
Here's my current Dolls! I have 2 teams built, and I'm working on building Element-specific teams. I actually got all the standard Elite Dolls on launch, so all I had to worry about was getting their Fortifications. Basically Wawa, Suomi, and Klukai were the only Limited Dolls I pulled.
Speaking of Limited Dolls, did you know I just got Wawa to V2 this patch?
I almost thought I wouldn't get her copy. I had 26k+ Collapse Pieces before the banners went up. I pulled on Klukai's banner first, and thankfully I won the 50/50, so I now own a V0 Klukai. The same could not be said for Wawa's, however. I lost my 50/50 to SABRINA, of all people. I fucking have her a V4 now because of this. Back to the topic, Klukai's banner left me with 9k ColPieces (I am not abbreviating Collapse Pieces) so I only have enough pulls left to rely on the 50/50. Of course, I lost that chance. I had 40 pulls remaining, so I literally grinded everything I could for ColPieces. I'm usually lazy about doing the weekly things, just for your information XD. Anyways you get the drill I got her copy just a ten pull away from guaranteed so yeah, that's a 10 pull saved for Vector or Springfield.
Here's some other Doll builds I'm proud of, and then we move on.
.
About Events, I think I haven't posted about it since Daiyan's, no? I pretty much finished every event besides Soujourners of the Glass Island, since that was during launch and I only had a shitty Tololo as a DPS. Anyways, my Wawa pretty much melts all the bosses, so I'm not doing too bad with Challenge Mode or anything.
Here's proof I finished all Challenge Modes besides SOTGI. I'll do the Aphelion one eventually.
Me finishing Night march,
My current progress in PVA,
And my Doll affinities. Yes, I bought a Covenant Ring for Wawa, since they cost IRL money. I plan on spending more money in this game, probably on Wawa's new skin since I wanna support Mica and I love my raifus.
My final thoughts are I LOVE GFL2 I LOVE MICA AND I LOVE MY GUN WIVES
Anyways shoutout to Akai for being a loyal member to our 2-member Platoon. Glad to see you stick with me despite us being strangers haha. And YOU, if you've read this far then I'll give you a kiss probably. I'll post more next time. Ja
1 note
·
View note
Text
Why Inland Tracking Systems Are Crucial in Freight Forwarding Software
In the dynamic world of freight forwarding, the journey doesn't end at the port. In fact, for many shipments, the most complex leg begins after ocean or air transit—during inland transportation. Whether it’s a container moving from a port to a warehouse, or a consignment being trucked to a final delivery point, the inland leg is full of variables that can impact timelines, costs, and customer satisfaction.
That’s where an inland tracking system becomes indispensable.
At QuickMove Technologies, we understand the need for real-time visibility and control over inland freight. Our freight forwarding software is equipped with powerful tracking features that ensure transparency, efficiency, and end-to-end logistics optimization.
What Is an Inland Tracking System?
An inland tracking system allows freight forwarders to monitor the movement of cargo during the land-based leg of its journey—typically by road or rail. It offers real-time GPS tracking, digital documentation, status updates, and performance analytics, all of which are crucial for smooth last-mile operations.
QuickMove’s inland tracking module is designed to integrate seamlessly into your freight operations, helping you reduce delays, cut costs, and deliver exceptional customer service.
Why Inland Tracking Matters
1. Complete End-to-End Visibility
Ocean and air legs may be well-monitored, but inland transport is often a black hole. With QuickMove’s integrated freight forwarding platform, freight forwarders gain complete visibility from the port to the customer’s doorstep—ensuring no blind spots in the supply chain.
2. Better ETA Predictions
Delays during inland transit can throw off the entire logistics schedule. Inland tracking systems collect real-time data that helps improve Estimated Time of Arrival (ETA) predictions and manage customer expectations. This is especially crucial for time-sensitive cargo.
3. Improved Customer Communication
With our CRM-enabled logistics software, clients can receive live updates about shipment status. Automated alerts and notifications enhance trust and transparency, reducing the volume of follow-up calls and emails.
4. Dispute Resolution and Proof of Delivery
Late delivery? Damaged cargo? A robust inland tracking system can help resolve disputes faster. With QuickMove’s transport management system, users can access digital proof of delivery (POD), route logs, and driver activity reports to verify claims and maintain accountability.
5. Performance Monitoring
Analyze route efficiency, driver behavior, and delivery patterns with the analytics dashboard in QuickMove’s logistics platform. By tracking inland journeys, businesses can identify bottlenecks and optimize routes to save time and fuel.
Inland Tracking in Multimodal Logistics
In multimodal freight operations, where goods move across sea, air, and land, having a unified system is essential. QuickMove’s end-to-end logistics software consolidates all movement data—whether it’s a container on a vessel or a truckload in transit—into a single platform for effortless coordination.
Our inland tracking module also integrates with warehouse management and inventory systems to streamline the inbound process once cargo reaches its destination.
Final Thoughts
Inland transportation might seem like the “last mile,” but it can make or break the customer experience. Investing in a robust inland tracking system within your freight forwarding software ensures that no shipment is ever out of sight—or out of control.
Looking to digitize your inland freight operations? Explore how QuickMove Technologies is helping freight forwarders worldwide modernize their logistics workflows with smart, cloud-based solutions.
0 notes
Text
The Role Of Evidence In Private Investigations
Private investigations are essential in establishing the truth for personal, legal, or business purposes. The core of a successful investigation is evidence—the indispensable element that confirms allegations, substantiates conclusions, and facilitates decision-making. Whether it is CCTV footage, accounting records, eyewitness accounts, or computer forensics, evidence makes an investigation credible and successful. This blog discusses the significance of evidence in private investigations, categories of evidence, methods of collection, and ethics.
Why Evidence is Crucial in Private Investigations
Evidence is the backbone of any private investigation. Without proof that can be verified, an investigation is inconclusive or speculative. Evidence importance can be distilled into the following areas of focus: - Verification of Allegations – Evidence presents factual support to an accusation or suspicion to avoid unfounded accusations. - Legal Admissibility – Legally collected evidence can be utilized during legal proceedings to substantiate a case in court. - Decision-Making – Clients make informed decisions based on evidence about personal, business, or legal issues. - Protection from False Allegations – Concrete proof prevents innocent people from being falsely accused.
Types of Evidence in Private Investigations
Private investigators collect various kinds of evidence based on the case's circumstances. The following are the main categories: 1. Physical Evidence Physical evidence consists of tangible objects that can be brought to an investigation or trial. Some examples include: - Surveillance videotapes - Papers (contracts, letters, financial reports) - Weapons or devices that have been used in an incident - Personal items regarding a case 2. Digital Evidence Today, most evidence gathered during investigations is electronic. It consists of: - Emails and text messages - Call logs and phone records - Social media usage - CCTV footage - Computer and mobile device forensics 3. Testimonial Evidence Testimonial evidence is provided by witnesses, informants, or people involved in the investigation. It consists of: - Eyewitness statements - Interviews and recorded confessions - Expert testimonies (forensic experts, IT experts, etc.) 4. Circumstantial Evidence Circumstantial evidence implies that something is true but does not affirmatively prove it. It involves logical reasoning in linking the evidence to the conclusion. Examples include: - Patterns of suspicious behaviour - Financial irregularities showing fraud - Abnormal behavioural changes in a person 5. Forensic Evidence Forensic science contributes significantly to investigations. This can include: - DNA analysis - Fingerprints - Handwriting authentication - Bloodstain analysis
Methods of Evidence Collection
Private investigators employ various techniques to collect evidence while maintaining its authenticity and reliability. Some of the most widely used methods include: 1. Surveillance Surveillance investigation is one of the most commonly employed methods, where a subject's activities are monitored discreetly using: - Spy products or Hidden cameras - GPS tracking - Observational methods - Audio recording (where permitted by law) 2. Background Checks Investigators conduct background checks to confirm personal information, criminal records, financial information, and employment history. This is particularly crucial in: - Pre-matrimonial investigations - Corporate due diligence - Fraud detection 3. Undercover Operations At times, private investigators go undercover to collect firsthand information. This method is useful in instances of: - Employee misconduct - Corporate espionage - Infidelity investigations 4. Forensic Analysis Investigators often work with forensic experts to examine: - Handwriting samples - Fingerprints - Electronic devices for data recovery - Financial transactions for the detection of fraud 5. Digital and Cyber Investigations With the advancement of cybercrime, digital forensics is now an important part of investigations. Private investigators recover: - Deleted files - Internet-based transaction records - Email communication - Social media interactions
Maintaining the Integrity of Evidence
For evidence to be credible, it should be acquired and stored properly. The following are some best practices: - Legality – Private investigators must follow surveillance, privacy, and evidence-gathering laws. - Chain of Custody – Documentation protects evidence from tampering from the time of gathering through presentation. - Employment of Technology – New gadgets like encrypted data storage, forensic software, and high-resolution cameras improve the authenticity of evidence. - Avoiding Fabrication – Moral investigators should never makeup or fake proof because it can have legal repercussions.
Challenges in Obtaining Evidence
Despite the significance of evidence, private investigators encounter several challenges, some of which include: - Legal Constraints – Privacy acts restrain the level of surveillance and computer monitoring. - Tampering & Manipulation – Certain subjects might try to manipulate or destroy evidence. - Unreliable Witnesses – Testimonial evidence can be ambiguous or prejudiced. - Technology Barriers – Encrypted communication and secure online platforms complicate cyber investigations.
Legal and Ethical Issues
Private investigators must adhere to ethical standards and legal laws when gathering evidence. These include: - Compliance with Local Laws – Investigators must ensure they do not breach wiretapping, trespassing, or data protection legislation. - Informed Consent – In interviews or testimonial evidence cases, seeking consent ensures ethical integrity. - Avoiding Defamation – Evidence must never be used to accuse people of wrongdoing that could harm their reputations. - Maintaining Confidentiality – Investigators must keep client details confidential and ensure sensitive evidence does not get into the wrong hands.
Conclusion
The use of evidence in private investigations cannot be overemphasized. Whether discovering fraud, checking out people's backgrounds, or assisting legal cases, evidence is the key to any successful investigation. Private detective agency employ several methods, ranging from forensic examination and surveillance to cyber investigations, ensuring their evidence is credible and admissible. Gathering evidence, though, is not without problems and legalities, so investigators must stay within ethical and legal confines. In the end, precise, well-documented evidence adds weight to a case and guarantees justice and informed decision-making. Read the full article
#MethodsofEvidenceCollection#TheRoleOfEvidenceInPrivateInvestigations#TypesofEvidence#WhyEvidenceisCrucialinPrivateInvestigations
1 note
·
View note