Sorting by

×

Database Manipulation & Infrastructure-Level Web Host Sabotage: A Content Creator’s Investigation

HACKED: THE SAGA #56 Date: October 3, 2025 Duration: 30:59 min
Watch Now

πŸ”₯ Key Revelations

  • Database duplication and server-level manipulation
  • AI content plagiarism of Bible studies
  • WordPress security vulnerabilities through hosting services
  • Analytics fraud and traffic manipulation
  • Multi-platform account compromise patterns
  • Device security failures and rapid compromise
  • Search engine result manipulation
  • Content distribution throttling
  • Live streaming platform sabotage
  • Infrastructure-level cybercrime operations

Episode Summary

This episode documents an active investigation into systematic website sabotage, including evidence of duplicate databases on Cloudways hosting, altered WordPress metadata, and AI plagiarism of original Bible study content. The creator discovers that attempts to update her website are blocked by password manipulation and man-in-the-middle attacks. She demonstrates how the same database appears differently depending on login credentials and IP address, suggesting server-level content manipulation.

The investigation also reveals massive Google Analytics fraud (showing 1,500 monthly views versus 47,000+ actual sessions) and systematic content theft where AI models have plagiarized her Job Bible study series because it was the only quality content available on that topic when created in 2021.

Additional evidence includes social media platform manipulation, throttled content distribution, and coordinated sabotage across multiple services.

πŸ“ Key Moments

00:03:40- β€œLiterally there was a whole search results full of Job 20 and the danger of a wrong focus. It's very obvious it was plagiarized from me.”
00:04:26- "There was crap on the internet for Job … So the only thing online was mine... So all of these post-2021 studies generated off of AI, they're using my work because there wasn't anything else."
00:15:39- "There are three usernames on the second one... It's the exact same database but I'm seeing two different things."
00:27:14- "Google Analytics has been showing 1500 to 1700 views in a month ... On Cloudflare it says I have 60,000 views in a month."
00:11:26- "Burner phone number six ... within two hours they had already basically locked it down."
00:18:43- "There's double books. There's double databases ... Amazon, Ingram Spark, Twitter... they're doing it to individual people's websites."
00:28:48- "They are thieves. They are working off of stolen work and they're putting out straight up plagiarized content... It doesn't matter how many people have read it. They are thieves."

Detailed Show Notes

Introduction: Planned Update Leads to Discovery

Timestamp: [00:00:00 – 00:02:01]

  • Attempted to update content on raisedtowalk.org related to Day of
    Atonement
  • Password suddenly rejected despite being correct
  • Previous live streams have experienced technical sabotage
  • Decision to document the investigation in real-time

Evidence of AI Plagiarism: Job 20 Bible Study

Timestamp: [00:02:01- 00:07:30]

  • Created comprehensive Job Bible study series in 2021 (every chapter)
  • Job 20 titled “The Danger of a Wrong Focus” – focusing on Zophar’s
    response
  • No other quality Job commentary existed online at that time
  • Search results now show multiple sources with identical title
    structure
  • Gemini AI summary stealing traffic by displaying plagiarized content
    instead of linking to original
  • Screenshots taken but later altered on compromised devices
  • Original work was unique because existing Job content was superficial
    (“five takeaways” style)

WordPress Metadata Manipulation

Timestamp: [00:07:30 – 00:10:22]

  • Job 20 article metadata changed in database without authorization
  • Original format: Title | Category | Site Title
  • Altered to include “Zophar’s wrong focus” in metadata
  • Change designed to make plagiarism less obvious in search results
  • Attempts to edit blocked by access restrictions

Work Interference & Device Tampering

Timestamp: [00:10:22 – 00:13:09]

  • Plan to promote Bible study on Job 20 for the Day of Atonement
  • Work process: photo or video on phone β†’ Google Photos β†’Β  laptop
    for edits
  • Upload to Google Photos from phone was blocked
  • Interference / block on laptop, couldn’t view latest photos on Google
    Photos
  • Saving to Proton Drive was blocked
  • Service was locked down and controlled on burner phone #6 within two
    hours of activation on the AT&T network
  • Put real name at Target during purchase – mistake that enabled rapid
    compromise
  • Location tracking immediately altered after compromise
  • Photos on phone hacked as they’re taken
  • Google Photos upload blocking
  • Required complex workaround: Quick Share to old phone β†’ Upload to
    Google Photos β†’ Access Google Photos on Library computer β†’ Thumb drive β†’
    Laptop
  • Claude AI suggested possible man-in-the-middle attacks
  • Suspects federal government involvement or bribed service provider
    employees

Database Manipulation Discovery

Timestamp: [00:13:09 – 00:16:08]

  • WordPress site hosted on Cloudways
  • Password reset completed successfully but still couldn’t log in
  • Attempted database-level password change through Cloudways manager
  • First database login showed two user accounts
  • Second login from different VPN profile showed THREE usernames instead
    of original count
  • Same database name but different content served based on user/IP
    address
  • Cloudways dashboard only shows single database – duplication invisible
    to account holder
  • Third username was created during migration to Cloudways

Imunify 360 as Attack Vector

Timestamp: [00:16:08 – 00:18:35]

  • Imunify 360 security service appearing as throttling mechanism
  • Same service used to sabotage previous hosting on Green Geeks
  • Creates “gate” before login screen
  • Controls who can access legitimate site versus manipulated version

Pattern of “Double Books” Across Platforms

Timestamp: [00:18:35 – 00:21:07]

  • Amazon KDP account: Support cannot see phone number restricting access
  • Cannot view financial details or change bank information
  • Ingram Spark: Email confirmation that their dashboard showed different
    data than creator’s dashboard
  • Twitter: Posts appearing twice, throttled distribution
  • Facebook, LinkedIn: Must log in to see profiles that should be public
  • Not just social platforms – affecting individual websites

Criminal Activity Assessment

Timestamp: [00:21:07 – 00:22:09]

  • Infrastructure-level sabotage beyond typical hacking
  • Knows names of some individuals involved (described as “grunts”)
  • Beyond Jason Smith, the rest of the those involved from the HBU apologetics circle wouldn’t have the hacking experience
  • Significant money is funding this level of sabotage

Restream Platform Sabotage

Timestamp: [00:22:09 – 00:23:07]

  • Restream account synced to “Hacked: the Saga” Rumble channel
  • Streams automatically redirect to profile instead of channel with no
    option to change
  • Subscribers on channel won’t receive notifications
  • Cannot change setting despite proper account sync
  • Previous live stream sabotaged with audio-video sync issues at
    43-minute mark

David Bower’s Guide to the End Times Promotion

Timestamp: [00:23:07- 00:26:12]

  • First Bible study teacher at Second Baptist Church
  • Website: rdavidbower.com (blogging since 2011)
  • Extensive end times teachings being suppressed in search results
  • Created comprehensive summary page, “David Bower’s Guide to the End Times,” with all his teachings organized
  • Made social media graphics for every category (square and story
    formats)
  • Evidence of search manipulation and conflation with other authors
  • Suspected plagiarized book on Amazon using his work

Analytics Fraud Evidence

Timestamp: [00:26:12 – 00:30:52]

  • Google Analytics (GA4) showing only 1,500-1,700 views per month
  • Hasn’t had traffic that low since 2013 (first year of blogging)
  • Cloudflare DNS reports 60,000 views per month
  • Found report showing 47,000 first-use sessions in one month
  • Pattern suggests daily traffic numbers are being displayed as monthly
    totals
  • Likely manipulation through Google Family Group access or system-level
    hack
  • Content theft regardless of audience size – “they are thieves”
  • YouTube transcript sabotage making statements appear opposite of
    actual words
  • Criminals believe they’re above the law

🎯

Update on Duplicate Website Version

The standard operating procedure of the criminals is to change back the site and erase the evidence of the original sabotage so that it will look like I don’t know what I’m talking about.

I sent a support request to Cloudways on Saturday, October 4th. I was working on my laptop for the remainder of the day, I didn’t receive a reply email. When I checked my email on Sunday afternoon, October 5th, I still had not received a reply. There was a new sabotage on my site (more below), so I posted the following thread on Twitter. Immediately after I posted the thread, the response from Cloudways support came through, which was originally sent on Saturday afternoon.

This is evidence that even though I moved my email hosting to Protonmail, my email traffic is being blocked at an infrastructure level.

The new sabotage discovered today, Sunday, October 5th, is altered html for the link from the home page of RaisedtoWalk.org to the Bible study page for “Job 20: The Danger of a Wrong Focus.”

Clicking on the link leads to an error page because the button on the home page was linking to https://raisedtowalk.org/bible-study/job-20-the-danger-of-having-a-wrong-focus/%E2%80%9D%20data-icon=

This was sabotage. I had tested the link when I changed the page. There was not an error in the HTML. Not only that, but when I went to edit the page to correct it, assuming that hackers had somehow intercepted a submission when I was working on the page … there was no error in the HTML. It was correct.

Again, what I had access to edit in the backend of my site was not what was being displayed on the public version of the site. I did not save it. I left it as it and posted the Twitter thread below.

The response to this was two-fold:

1) The response email Cloudways support which had been sent the day before, immediately appeared in my site.

2) When I went back about an hour or so later to check the html for the link to the Job 20 Bible study, once again it had been changed. The first time I checked it, the html was correct, with the [data-icon=”I”] for the link correctly formatted. When I went back into the editor the second time, the html had been changed to [data-icon=”] Which would have thrown an error, but as anyone who knows HTML would be able to tell … it would not have resulted in the URL that was giving the error page.

That change in HTML doesn’t even show in the revision history {see below).

Raised to Walk revision history

10-5-25: the revision history for the home page of Raised to Walk showing that the HTML for the data icon was properly formatted. It also shows sabotage of the video display by inserting paragraph tags around it. I did not change that or even edit it in the visual editor

Twitter Thread on Sabotage

Hey @Cloudways. I sent a support ticket about this issue that I livestreamed about. The fact that what I can access on my dashboard & the changes that display on my site are not what is displaying. There are two databases

This is how the criminals are controlling access to information that I put out. It’s not enough that they lock down all my social media posts, they are controlling what I publish on my own site by switching between a database they control & my updates on
@Cloudways

There are screenshots in the Livestream linked above, but here is another example. They are trying to hide their plagiarism of my Bible study on Job 20, which I put on the home page of my site – which right now goes to a page not found error bc of a bad URL

But, look here. Editing the home page on the database version that I have access to, there is no error in the html. The version that was served to me on a different VPN profile than I normally use had an error in the URL. What I can edit & what is being shown are different

So anyway, @Cloudways, I did respond to the support request just now. But just in case the losers are blocking my sending as well as receiving, these are the screenshots of the two different versions of the database on Friday.

I couldn’t launch the database manager at all yesterday @Cloudways, so I can’t tell you which version I am seeing. As I said in the livestream & my response to the support ticket, when I was at @goGreenGeeks , they were restricting access through @imunify360 & hacking the db

Based on the site response for both editing & accessing, & based on what they’ve done on other platforms, my guess is they’ve duped the database & have certain tables synced when I update, editing what they want. They serve their version by controlling through
@imunify360

That’s just my supposing. @Cloudways
I’m not a hacker or cyber criminal.

They operate by employing hackers, bribing employees, and using weaponized AI.

If they’re doing this to me, who knows how many other people they’re doing it to

 

 

Follow-Up Twitter Thread

The duplicate database to control access to my website is not the only thing that is being restricted. This was done long before on my social media accounts such as Facebook, Twitter, and Youtube. A thread on X about it.

FYI, I haven’t received a response about this other than they were looking into it. -Something- has changed though because my site is loading faster, back to what it was when I first transferred my site

But I figured out what happened to my original @efusionmg @x account (I had to recreate it). You know how the criminals moved my original @Meta @facebook & @instagram onto one of their sock puppet accounts when they hacked all my accounts in Aug 2024?

That is what they did with my first @efusionmg acct. Back when I was subscribing to premium @x on this account, the email that was attached to it was an http://efusionmg.com address rather than one for Raised to Walk, and I could NOT change it

What is interesting is that even though this account SHOWS a http://RaisedtoWalk.org email address for it, that is not what shows if I try to subscribe to premium – it shows the http://efusionmg.com address. What’s the deal @elonmusk ?

https://x.com/RaisedtoWalk/status/1975589000942629206

Like this last one … Obviously not going to make it to the public account

Which is why when I posted this about losers in Revere, MA hacking my @zotero account (I know y’all, they’re academics), it only shows 44 views for me w/no engagement, when the actual stats were 3,700 w/hundreds of likes & comments

And it looks to me this is the same thing that’s going on with my @YouTube account – besides the fact that the captions & analytics interface are COMPLETELY different – I updated this cover photo days ago, the public facing site is showing the default from the Livestream.

And it wasn’t two days ago … it was four, I streamed it on Friday.

Was there a glitch in the system?

Is the AI crime model breaking down?

Get Updates!

Subscribe to our free newsletter for updates of upcoming Bible studies, news and events.

    We respect your privacy. Unsubscribe at any time.

    Discussion & Engagement

    πŸ’¬ Discussion Questions

    Database Manipulation

    • What legitimate reasons could explain seeing different database
      contents on the same login credentials?
    • How can website owners verify their database hasn’t been duplicated at
      the server level?
    • What security measures should hosting companies implement to prevent
      this type of manipulation?
    • Is this evidence of a sophisticated attack or system configuration
      issues?

    AI Plagiarism

    • How can content creators prove their work was the original source when
      AI generates similar content?
    • What responsibility do AI companies have to track training data
      sources?
    • Should search engines prioritize original sources over AI-generated
      summaries?
    • How does the timing of content creation (2021, pre-AI boom) strengthen
      the plagiarism case?

    Analytics Fraud

    • What methods can creators use to cross-verify their actual traffic?
    • If Google Analytics shows 1,500 views but Cloudflare shows 60,000,
      which is more reliable?
    • How does analytics manipulation harm content creators financially?
    • What legal recourse exists for documented analytics fraud?

    Multi-Platform Compromise

    • What patterns suggest coordinated attacks versus individual security
      failures?
    • How can creators protect themselves when even new burner phones are
      compromised within hours?
    • What does the “double books” pattern across multiple platforms
      indicate?
    • Is this more likely government surveillance or private criminal
      operation?

    Content Creator Rights

    • At what point does an AI summary become theft versus fair use?
    • How should plagiarism claims work when the theft is systematic across
      many sources?
    • What protections exist for independent content creators against this
      type of theft?
    • Should there be legal requirements for AI to cite original
      sources?

    Join the Discussion

    Connect with other truth-seekers on our Discord server

    <a href="https://raisedtowalk.org/author/carla/" target="_self">Carla M. Sallee Alvarez</a>

    Carla M. Sallee Alvarez

    Carla Alvarez is the founder of Raised to Walk and a founding board member of An Unexpected Journal, a Communications Director at Legacy Marketing Services where she uses her BS in Marketing to create communication strategies for business, and an unlikely case manager and Bible Study teacher for the Afghan Christians of Kabul Hope Latest Series: Hacked: the Saga How an oily politician and a band of intellectual property and identity thieves conspired to erase a third-grade Sunday school teacher, Read more of her work on Google Scholar and Substack or contact her to write for you.

    To support me and my work directly: donate at @RaisedtoWalk on Venmo and $RaisedtoWalk on CashApp and Chime

    The institutions and people tagged are those mentioned in the stream. It does not mean that they are part of a criminal conspiracy or any wrongdoing. The tags are solely for organizational purposes to find mentions more easily.