Sorting by

×

Exposing Digital Identity Theft: How Fake Account Networks Steal Content and Block Communications

HACKED: THE SAGA #59 Date: October 25, 2025 Duration: 53:40 min
Watch Now

πŸ”₯ Key Revelations

  • Email list sabotage and lead diversion
  • Infrastructure-level communication blocking
  • Carrier-level phone hacking
  • Facebook account manipulation and doppelganger profiles
  • Identity theft networks spanning over a decade
  • Local social media agency fraud operations
  • Meta’s complicity in fake account systems
  • Christian content theft and apologetics fraud
  • Police report against Houston Christian University dean
  • Israel-Gaza commentary from evangelical perspective

Episode Summary

This episode documents ongoing digital harassment and systematic fraud including hacked communications, stolen intellectual property, and coordinated identity theft networks.
The host shares evidence of infrastructure-level email blocking, manipulated social media analytics, fake account operations spanning over a decade, and Meta’s knowing participation in fraudulent account systems.

She details a police report filed against a Houston Christian University dean, discusses the facade of stolen Christian content, and addresses the disconnect between evangelical support for Israel and accountability for genocide in Gaza.

πŸ“ Key Moments

00:46:09- "Facebook itself excluded my fake account from advertisingβ€”they KNEW it was fake. This isn't exploitation, it's BY DESIGN."
00:12:07- "17 downloads, ZERO newsletter signups. Someone else has been getting my email list for a DECADE."
00:25:42- "Salem Police: 'I don't know if there's any crime here.' Me: Hacking, IP theft, identity theft... Oregon must be an alternate universe."
00:18:08- "If you're a pastor 'known for great sermons' but you're not writing themβ€”you're a FRAUD. Do the work or do something else."
00:29:03- "They created a doppelganger Facebook account in 2013β€”YEARS before I met the people now directly attacking me. This was planned."
00:22:06- "My ProtonMail bounced back as 'email doesn't exist'β€”smoking gun proof my communications are blocked at infrastructure level."
00:27:18- "Social media agencies' business model: create accounts impersonating real people, have employees run them, sell 'engagement' to clients. It's ALL fraud."
00:52:20- "We can support Israel's right to exist WITHOUT funding genocide. You cannot do evil things and call yourself good."
00:45:10- "Every advertiser on my fake account had me on EXCLUSION listsβ€”they don't waste money on fake accounts. They ALL knew."
00:52:57- "Charlie Kirk was right: Netanyahu would be in jail if he wasn't PM. He went from corrupt to outright evilβ€”and we're funding it."

Detailed Show Notes

Introduction & Series Background

Timestamp: [00:00:12 – 00:04:11]

  • Streaming setup challenges due to ongoing hacking interference
  • Series focus: “Hacked The Saga” documenting intellectual property
    theft and platform sabotage
  • RaisedToWalk.org mission: sharing biblical studies and book reviews
    for Christian living
  • Content theft led to this documentary series about systematic sabotage
  • Filed 200-page FBI report in August 2024 with no response
  • First livestream August 4, 2024 after authorities refused to act

Episode Overview & Agenda

Timestamp: [00:04:11 – 00:06:16]

  • Update on The Facade book discussion guide publication
  • Blocked communications evidence
  • Reminder of police report filed against HCU dean Phil Tallon
  • Discussion of facades and identity theft
  • Commentary on Israel-Gaza situation from evangelical perspective
  • Defense of the term “evangelical” despite negative associations

The Facade Discussion Guide & Email List Sabotage

Timestamp: [00:06:16 – 00:16:05]

  • Published discussion guide for Michael Heiser’s fiction novel The
    Facade
  • Heiser wrote novel while completing dissertation on divine council
  • Discovery: 17 downloads but zero newsletter signups via Bloom plugin
  • Bloom plugin analytics showed all zeros despite decade of use
  • Evidence of leads being diverted to someone else
  • Switched to different email service with hosted downloads
  • Database manipulation based on IP address with screenshots as proof
  • Warning: newsletter signups over past decade likely went to
    impersonators
  • DNS and domain email settings have been compromised

Police Report Against Phil Tallon

Timestamp: [00:17:08 – 00:18:34]

  • Filed police report October 6 with Salem Police Department
  • Named Phil Tallon (HCU dean) as part of intellectual property theft
    ring
  • No response received from authorities
  • Commitment to keep pursuing accountability
  • Criticism of fraudulent Christian writers using stolen content
  • Call for authentic work or career change for fake pastors/writers

Communication Blocking Evidence

Timestamp: [00:18:34 – 00:26:10]

  • Testing website forms revealed systematic email blocking
  • ProtonMail encrypted emails still blocked at infrastructure level
  • Claude AI confirmed authorities can block encrypted emails at
    infrastructure level
  • Email to Second Baptist admin pastor Mark Terry received no response
  • Test emails to raisedtowalk.org and Proton addresses both failed
  • Email service provider confirmed Proton email bounced as
    “non-existent”
  • Alias email worked immediately – proves targeting of specific
    addresses
  • Smoking gun evidence of infrastructure-level blocking

Phone & Carrier-Level Hacking

Timestamp: [00:23:29 – 00:26:10]

  • Metro PCS account showed Samsung Galaxy instead of actual Google Pixel
    4a
  • Call log completely blank – no incoming phone numbers recorded
  • Outgoing calls show “123” placeholder instead of actual numbers
  • Evidence of call spoofing using her phone number
  • Phone stolen July 28, cloned, then returned after email access
    obtained
  • Backup codes stolen through bribery (Starbucks gift cards)
  • Switched from Fastmail to ProtonMail – normal for 2 days then locked
    down again
  • Infrastructure-level carrier hack to block all communications

Google Account Hijacking

Timestamp: [00:25:04 – 00:26:01]

  • Hackers created Google family account on main email
  • Gave perpetual access to all Google properties
  • Unable to remove access despite multiple password changes
  • Salem Police response: “I don’t know if there’s any crime here”
  • Officer needed to “research” if hacking and IP theft are crimes

Facebook Account Manipulation & Doppelganger Discovery

Timestamp: [00:26:10 – 00:31:02]

  • Original Facebook account: CMAlvarez
  • After August 4 livestream exposing YouTube fraud, account locked for 3
    days
  • Moved to doppelganger account “CarlaAlvarez” through Meta’s built-in
    profile management
  • Not a hack – official Meta feature used to switch user access
  • All current Facebook “friends” are fake accounts impersonating real
    people
  • Systematic identity theft network
  • Despite 2FA and password changes, hackers still edit account
  • Doppelganger account created same time as original but started
    impersonating in 2013

The 2013 Connection & Local Suspects

Timestamp: [00:29:03 – 00:39:10]

  • Impersonation began in 2013 – before meeting HBU or apologetics groups
  • Timeline: Started Legacy Marketing business 2003
  • Active in Mothers of Young Children and Kingwood Chamber of Commerce
  • Organized Picnic on the Park 2004-2009
  • Helped launch March of Remembrance Kingwood in 2012
  • 2013: Seven marches across Houston – same year impersonation started
  • Theory: Local social media agencies create fake accounts of community
    members
  • Agencies use fake accounts to provide engagement for clients
  • Business model based entirely on identity theft and fraud

Jennifer Joswiack Content Theft Incident

Timestamp: [00:35:07 – 00:36:25]

  • Jennifer Joswiack repeated newsletter content verbatim at Chamber
    luncheon
  • Content delivered day after or morning of newsletter send
  • Regrets not confronting the theft immediately
  • Lesson: Always call out intellectual property theft when it happens
  • Silence enabled escalation to complete content theft operation

Sam Schrade & The 24/7 Networking Group

Timestamp: [00:36:25 – 00:37:20]

  • Sam Schrade and Jennifer Joswiack started 24/7 networking group
  • Immediate bad vibes from Sam Schrade from first meeting
  • Never connected on social media due to distrust
  • Sam Schrade operates video studio – relevant to content theft
    operation
  • Trusted instincts about suspicious people

David Cherry Social Media Connection

Timestamp: [00:37:42 – 00:39:10]

  • Jennifer Joswiack close friends with Paige Cherry
  • Created website for home and garden show
  • David Cherry (Paige’s husband/brother) promoted as social media expert
  • Never friends with David Cherry but connected to mutual Facebook
    friends
  • Suspects local Kingwood/Humble area social media agency behind
    operations
  • Knows clients through hijacked subscriptions
  • Confident attorney can trace back to actual perpetrators
  • Warning: Entire business based on fraud will be exposed

Instagram Sabotage & Leslie Witkov Identity Theft

Timestamp: [00:40:07 – 00:44:02]

  • Instagram followers replaced with fake accounts showing unrelated
    content
  • Deliberate algorithm sabotage to sink authentic content
  • Google tagged random account photo as friend Leslie Witkoff
  • Someone impersonating Leslie on WhatsApp sending knitting photos
  • Same afghan photo sent repeatedly – clear fake
  • Leslie’s Facebook account hacked and stolen in 2022
  • Hackers contacted friends with scams, converted knitting page to
    insurance scams
  • Impersonators only have information up to 2022 – obvious fake
  • Same perpetrators hacking multiple victims’ accounts
  • Creating fake personas using stolen photos and identities

Facebook Doppelganger Account Analysis

Timestamp: [00:44:02 – 00:47:23]

  • Doppelganger account used as “house account” by multiple employees
  • Login activity from locations across entire country
  • Two-day period with six different logins from Baytown, Texas
  • Theory: Social media agency onboarding new employees to run fake
    accounts
  • Facebook advertising settings revealed exclusion lists
  • Every advertiser had doppelganger account on exclusion list
  • Advertisers don’t waste money on fake accounts
  • All advertisers participate in “clean rooms” data sharing
  • Critical evidence: Facebook/Meta itself excluded the account from
    advertising
  • Meta knew account was fake – not exploitation, but intentional system
    design
  • Meta partners with fraudsters for fake engagement on ads

Social Media Platform Manipulation

Timestamp: [00:47:23 – 00:48:16]

  • Requirement to log in to see public profiles indicates massive fake
    account networks
  • Content displayed varies based on who’s viewing and their location
  • Different fake account sets shown to different users
  • Cannot trust any social media for reliable information
  • Fake accounts control narrative by displaying curated misinformation
  • Systematic information manipulation across all platforms

Israel, Gaza & Evangelical Responsibility

Timestamp: [00:48:16 – 00:53:02]

  • Genesis 12:3 mandate to bless Abraham’s descendants
  • Psalm 122:6-7 prayer for peace of Jerusalem
  • Correction of interpretation: “May they prosper who love you” refers
    to loving God, not Jerusalem
  • Prayer should be for peace and prosperity of God-lovers everywhere
  • Support Israel’s right to exist as state but not right to commit
    genocide
  • Two-state solution is manipulation to whittle away Israel
  • Completely wiping out a people is never acceptable
  • Cannot do evil and call yourself good
  • God holds His people to higher standards
  • Charlie Kirk’s skepticism about October 7 attack
  • Netanyahu facing bribery and corruption charges
  • Netanyahu evolved from corrupt to outright evil
  • Christians should not support, endorse, or fund evil
  • Support Jewish people and Israel’s existence but not annihilation of
    Palestinians
  • Funding genocide brings curse on our nation
  • Must maintain moral clarity regardless of political allegiances

Closing & Future Plans

Timestamp: [00:53:02 – 00:53:24]

  • May expand on Israel-Gaza topic in future episodes
  • Encouragement to viewers
  • Commitment to continue exposing fraud

Related Evidence

No evidence has been linked to this episode yet.

Get Updates!

Subscribe to our free newsletter for updates of upcoming Bible studies, news and events.

    We respect your privacy. Unsubscribe at any time.

    Discussion & Engagement

    πŸ’¬ Discussion Questions

    Email & Communication Blocking

    • What infrastructure-level protections exist for individuals facing
      systematic communication blocking?
    • How can someone verify their emails are actually reaching intended
      recipients?
    • What legal recourse exists when encrypted email services are blocked
      by authorities?

    Social Media Fraud

    • How can users identify if their social media accounts have been cloned
      or impersonated?
    • What responsibility do platforms like Meta have when they knowingly
      allow fake accounts?
    • Should advertising exclusion lists be visible to account holders as
      proof of authentication?

    Local Business Fraud

    • How can community members identify if local businesses are operating
      fraudulent social media services?
    • What steps should you take immediately if you discover someone using
      your intellectual property?
    • What are the long-term community consequences when local businesses
      base operations on identity theft?

    Christian Ethics & Accountability

    • How should Christians balance support for Israel with accountability
      for human rights violations?
    • What responsibility do Christian content creators have to ensure their
      work is authentic?
    • How does the church address fraud within its own leadership and
      institutions?

    Law Enforcement Response

    • Why might law enforcement agencies be reluctant to pursue digital
      fraud cases?
    • What documentation is most effective for reporting sophisticated
      hacking operations?
    • How can victims escalate cases when local police claim “no crime
      occurred”?

    Join the Discussion

    Connect with other truth-seekers on our Discord server

    <a href="https://raisedtowalk.org/author/carla/" target="_self">Carla M. Sallee Alvarez</a>

    Carla M. Sallee Alvarez

    Carla Alvarez is the founder of Raised to Walk and a founding board member of An Unexpected Journal, a Communications Director at Legacy Marketing Services where she uses her BS in Marketing to create communication strategies for business, and an unlikely case manager and Bible Study teacher for the Afghan Christians of Kabul Hope Latest Series: Hacked: the Saga How an oily politician and a band of intellectual property and identity thieves conspired to erase a third-grade Sunday school teacher, Read more of her work on Google Scholar and Substack or contact her to write for you.

    To support me and my work directly: donate at @RaisedtoWalk on Venmo and $RaisedtoWalk on CashApp and Chime

    The institutions and people tagged are those mentioned in the stream. It does not mean that they are part of a criminal conspiracy or any wrongdoing. The tags are solely for organizational purposes to find mentions more easily.