Introduction & Series Background
Timestamp: [00:00:12 – 00:04:11]
- Streaming setup challenges due to ongoing hacking interference
- Series focus: “Hacked The Saga” documenting intellectual property
theft and platform sabotage - RaisedToWalk.org mission: sharing biblical studies and book reviews
for Christian living - Content theft led to this documentary series about systematic sabotage
- Filed 200-page FBI report in August 2024 with no response
- First livestream August 4, 2024 after authorities refused to act
Episode Overview & Agenda
Timestamp: [00:04:11 – 00:06:16]
- Update on The Facade book discussion guide publication
- Blocked communications evidence
- Reminder of police report filed against HCU dean Phil Tallon
- Discussion of facades and identity theft
- Commentary on Israel-Gaza situation from evangelical perspective
- Defense of the term “evangelical” despite negative associations
The Facade Discussion Guide & Email List Sabotage
Timestamp: [00:06:16 – 00:16:05]
- Published discussion guide for Michael Heiser’s fiction novel The
Facade - Heiser wrote novel while completing dissertation on divine council
- Discovery: 17 downloads but zero newsletter signups via Bloom plugin
- Bloom plugin analytics showed all zeros despite decade of use
- Evidence of leads being diverted to someone else
- Switched to different email service with hosted downloads
- Database manipulation based on IP address with screenshots as proof
- Warning: newsletter signups over past decade likely went to
impersonators - DNS and domain email settings have been compromised
Police Report Against Phil Tallon
Timestamp: [00:17:08 – 00:18:34]
- Filed police report October 6 with Salem Police Department
- Named Phil Tallon (HCU dean) as part of intellectual property theft
ring - No response received from authorities
- Commitment to keep pursuing accountability
- Criticism of fraudulent Christian writers using stolen content
- Call for authentic work or career change for fake pastors/writers
Communication Blocking Evidence
Timestamp: [00:18:34 – 00:26:10]
- Testing website forms revealed systematic email blocking
- ProtonMail encrypted emails still blocked at infrastructure level
- Claude AI confirmed authorities can block encrypted emails at
infrastructure level - Email to Second Baptist admin pastor Mark Terry received no response
- Test emails to raisedtowalk.org and Proton addresses both failed
- Email service provider confirmed Proton email bounced as
“non-existent” - Alias email worked immediately – proves targeting of specific
addresses - Smoking gun evidence of infrastructure-level blocking
Phone & Carrier-Level Hacking
Timestamp: [00:23:29 – 00:26:10]
- Metro PCS account showed Samsung Galaxy instead of actual Google Pixel
4a - Call log completely blank – no incoming phone numbers recorded
- Outgoing calls show “123” placeholder instead of actual numbers
- Evidence of call spoofing using her phone number
- Phone stolen July 28, cloned, then returned after email access
obtained - Backup codes stolen through bribery (Starbucks gift cards)
- Switched from Fastmail to ProtonMail – normal for 2 days then locked
down again - Infrastructure-level carrier hack to block all communications
Google Account Hijacking
Timestamp: [00:25:04 – 00:26:01]
- Hackers created Google family account on main email
- Gave perpetual access to all Google properties
- Unable to remove access despite multiple password changes
- Salem Police response: “I don’t know if there’s any crime here”
- Officer needed to “research” if hacking and IP theft are crimes
Facebook Account Manipulation & Doppelganger Discovery
Timestamp: [00:26:10 – 00:31:02]
- Original Facebook account: CMAlvarez
- After August 4 livestream exposing YouTube fraud, account locked for 3
days - Moved to doppelganger account “CarlaAlvarez” through Meta’s built-in
profile management - Not a hack – official Meta feature used to switch user access
- All current Facebook “friends” are fake accounts impersonating real
people - Systematic identity theft network
- Despite 2FA and password changes, hackers still edit account
- Doppelganger account created same time as original but started
impersonating in 2013
The 2013 Connection & Local Suspects
Timestamp: [00:29:03 – 00:39:10]
- Impersonation began in 2013 – before meeting HBU or apologetics groups
- Timeline: Started Legacy Marketing business 2003
- Active in Mothers of Young Children and Kingwood Chamber of Commerce
- Organized Picnic on the Park 2004-2009
- Helped launch March of Remembrance Kingwood in 2012
- 2013: Seven marches across Houston – same year impersonation started
- Theory: Local social media agencies create fake accounts of community
members - Agencies use fake accounts to provide engagement for clients
- Business model based entirely on identity theft and fraud
Jennifer Joswiack Content Theft Incident
Timestamp: [00:35:07 – 00:36:25]
- Jennifer Joswiack repeated newsletter content verbatim at Chamber
luncheon - Content delivered day after or morning of newsletter send
- Regrets not confronting the theft immediately
- Lesson: Always call out intellectual property theft when it happens
- Silence enabled escalation to complete content theft operation
Sam Schrade & The 24/7 Networking Group
Timestamp: [00:36:25 – 00:37:20]
- Sam Schrade and Jennifer Joswiack started 24/7 networking group
- Immediate bad vibes from Sam Schrade from first meeting
- Never connected on social media due to distrust
- Sam Schrade operates video studio – relevant to content theft
operation - Trusted instincts about suspicious people
David Cherry Social Media Connection
Timestamp: [00:37:42 – 00:39:10]
- Jennifer Joswiack close friends with Paige Cherry
- Created website for home and garden show
- David Cherry (Paige’s husband/brother) promoted as social media expert
- Never friends with David Cherry but connected to mutual Facebook
friends - Suspects local Kingwood/Humble area social media agency behind
operations - Knows clients through hijacked subscriptions
- Confident attorney can trace back to actual perpetrators
- Warning: Entire business based on fraud will be exposed
Instagram Sabotage & Leslie Witkov Identity Theft
Timestamp: [00:40:07 – 00:44:02]
- Instagram followers replaced with fake accounts showing unrelated
content - Deliberate algorithm sabotage to sink authentic content
- Google tagged random account photo as friend Leslie Witkoff
- Someone impersonating Leslie on WhatsApp sending knitting photos
- Same afghan photo sent repeatedly – clear fake
- Leslie’s Facebook account hacked and stolen in 2022
- Hackers contacted friends with scams, converted knitting page to
insurance scams - Impersonators only have information up to 2022 – obvious fake
- Same perpetrators hacking multiple victims’ accounts
- Creating fake personas using stolen photos and identities
Facebook Doppelganger Account Analysis
Timestamp: [00:44:02 – 00:47:23]
- Doppelganger account used as “house account” by multiple employees
- Login activity from locations across entire country
- Two-day period with six different logins from Baytown, Texas
- Theory: Social media agency onboarding new employees to run fake
accounts - Facebook advertising settings revealed exclusion lists
- Every advertiser had doppelganger account on exclusion list
- Advertisers don’t waste money on fake accounts
- All advertisers participate in “clean rooms” data sharing
- Critical evidence: Facebook/Meta itself excluded the account from
advertising - Meta knew account was fake – not exploitation, but intentional system
design - Meta partners with fraudsters for fake engagement on ads
Social Media Platform Manipulation
Timestamp: [00:47:23 – 00:48:16]
- Requirement to log in to see public profiles indicates massive fake
account networks - Content displayed varies based on who’s viewing and their location
- Different fake account sets shown to different users
- Cannot trust any social media for reliable information
- Fake accounts control narrative by displaying curated misinformation
- Systematic information manipulation across all platforms
Israel, Gaza & Evangelical Responsibility
Timestamp: [00:48:16 – 00:53:02]
- Genesis 12:3 mandate to bless Abraham’s descendants
- Psalm 122:6-7 prayer for peace of Jerusalem
- Correction of interpretation: “May they prosper who love you” refers
to loving God, not Jerusalem - Prayer should be for peace and prosperity of God-lovers everywhere
- Support Israel’s right to exist as state but not right to commit
genocide - Two-state solution is manipulation to whittle away Israel
- Completely wiping out a people is never acceptable
- Cannot do evil and call yourself good
- God holds His people to higher standards
- Charlie Kirk’s skepticism about October 7 attack
- Netanyahu facing bribery and corruption charges
- Netanyahu evolved from corrupt to outright evil
- Christians should not support, endorse, or fund evil
- Support Jewish people and Israel’s existence but not annihilation of
Palestinians - Funding genocide brings curse on our nation
- Must maintain moral clarity regardless of political allegiances
Closing & Future Plans
Timestamp: [00:53:02 – 00:53:24]
- May expand on Israel-Gaza topic in future episodes
- Encouragement to viewers
- Commitment to continue exposing fraud
