What kind of imagery comes to your mind when you hear “Human Trafficking” or “Sex Trafficking”? Most may imagine the crude stories they’ve heard on the news or seen in movies of a dirty person chained to the floor in a basement getting raped and beaten as paying customers are escorted in to use them. Maybe you think of a truck-liner packed with people being transported and sold like slaves?
Well, as scary as those real-life situations are in the U.S. today, there’s a much less publicized form of “Human Trafficking” in 2022 that’s far more frightening. It’s more sophisticated, much more difficult to escape, it can victimize people of any socio-economic class with ease, and it happens in plain sight completely invisibly. It’s happening NOW to an unknown number of victims, and public awareness is our only weapon to stop it.
The most frightening aspect of this new form of trafficking is how a victim can lose everything and everyone in their life before ultimately losing their life itself, and the entire process can occur while the victim remains blind to it happening if they fail to see the strings being pulled on the puppets around them. Tragically, the careful orchestration of crimes by traffickers may result in victims being silenced and disappearing without a legally-operated investigation into the matter, and premeditated manipulation by traffickers will ensure no one sheds a tear about the victim’s slow dissipation to death.
Well, as scary as those real-life situations are in the U.S. today, there’s a much less publicized form of “Human Trafficking” in 2022 that’s far more frightening. It’s more sophisticated, much more difficult to escape, it can victimize people of any socio-economic class with ease, and it happens in plain sight completely invisibly. It’s happening NOW to an unknown number of victims, and public awareness is our only weapon to stop it.
The most frightening aspect of this new form of trafficking is how a victim can lose everything and everyone in their life before ultimately losing their life itself, and the entire process can occur while the victim remains blind to it happening if they fail to see the strings being pulled on the puppets around them. Tragically, the careful orchestration of crimes by traffickers may result in victims being silenced and disappearing without a legally-operated investigation into the matter, and premeditated manipulation by traffickers will ensure no one sheds a tear about the victim’s slow dissipation to death.
THE PROCESS OF INVISIBLE TRAFFICKING
This aforementioned process of trafficking heavily revolves around the traffickers maintaining invisibility and plausible deniability to any crimes. Everything physically occurring to the victim or their possessions can only happen when they are absent, asleep, or preoccupied. A victim’s phone and other devices are used to monitor and control their communication, as well as determine their location and view/listen to them in real-time. The trafficker can then strategically plan to manipulate the victim’s friends/family/acquaintances to deeper embed themselves into the victim’s life. For example, a friend might be contacted via the victim’s phone contact list and then coerced to make a copy of the victim’s house keys without their knowledge, or by asking the victim to borrow their house keys to make a copy for the traffickers. The traffickers’ other option for gaining access to a victim’s residence is waiting until they’re sleeping or away from home and securing future access through whatever means necessary. After the entirety of the victim’s devices are hacked and the trafficker can readily access the victim’s residence and physical body, they can proceed to use the victim for their particular motive.
As you can imagine, this process is both tedious and time-consuming, and can be highly expensive for traffickers if their means of coercion involves financially compensating the people who assist them. For this reason, the first question to ask is always about the motive. Why do they want access to the victim? What is there to gain from controlling the victim’s communication? Obviously, motive may vary on a case-by-case basis, but the most universally plausible motives for any person to be trafficked are sexual gratification, financial gain, or sadistic pleasure.
This aforementioned process of trafficking heavily revolves around the traffickers maintaining invisibility and plausible deniability to any crimes. Everything physically occurring to the victim or their possessions can only happen when they are absent, asleep, or preoccupied. A victim’s phone and other devices are used to monitor and control their communication, as well as determine their location and view/listen to them in real-time. The trafficker can then strategically plan to manipulate the victim’s friends/family/acquaintances to deeper embed themselves into the victim’s life. For example, a friend might be contacted via the victim’s phone contact list and then coerced to make a copy of the victim’s house keys without their knowledge, or by asking the victim to borrow their house keys to make a copy for the traffickers. The traffickers’ other option for gaining access to a victim’s residence is waiting until they’re sleeping or away from home and securing future access through whatever means necessary. After the entirety of the victim’s devices are hacked and the trafficker can readily access the victim’s residence and physical body, they can proceed to use the victim for their particular motive.
As you can imagine, this process is both tedious and time-consuming, and can be highly expensive for traffickers if their means of coercion involves financially compensating the people who assist them. For this reason, the first question to ask is always about the motive. Why do they want access to the victim? What is there to gain from controlling the victim’s communication? Obviously, motive may vary on a case-by-case basis, but the most universally plausible motives for any person to be trafficked are sexual gratification, financial gain, or sadistic pleasure.
HACKING A HUMAN LIFE
The most fundamental component for the successful execution of modern human trafficking is for the trafficker to maintain ownership/visibility of the victim’s technology. As we all know, today our smartphones are used as tools for essentially every aspect of our lives, and most of us trust the communication sent/received from our phones to be reality. This is what makes it easy for a trafficker to create a victim’s reality using the grossly under-estimated utility of illegal hacking.
Hacking in 2022 is far more common than you may think, and it’s easier than ever to completely hijack a person’s phone or computer. Spyware-manufacturing companies disguised as parental control or employee monitoring software are easy to find on the web. Anyone who can afford a modest subscription price and operate a simple website can have access to do everything from disabling your apps, to viewing your bank account information, to spying on you at home naked through your device’s camera (invisibly!).
The most fundamental component for the successful execution of modern human trafficking is for the trafficker to maintain ownership/visibility of the victim’s technology. As we all know, today our smartphones are used as tools for essentially every aspect of our lives, and most of us trust the communication sent/received from our phones to be reality. This is what makes it easy for a trafficker to create a victim’s reality using the grossly under-estimated utility of illegal hacking.
Hacking in 2022 is far more common than you may think, and it’s easier than ever to completely hijack a person’s phone or computer. Spyware-manufacturing companies disguised as parental control or employee monitoring software are easy to find on the web. Anyone who can afford a modest subscription price and operate a simple website can have access to do everything from disabling your apps, to viewing your bank account information, to spying on you at home naked through your device’s camera (invisibly!).
Pictured right is the small list of features offered to spy on iPhones by the popular company Flexispy (Offered @ $199/three months)
As you can see, the invasive nature of these above features know no bounds and the intent behind using some of the features would more than likely always be malicious. Unfortunately, this list doesn’t even scratch the surface in terms of the technical potential to spy on you and control your devices. To put it bluntly… every function within every device you own can most likely be hacked and manipulated.
WHY IS HACKING SO IMPORTANT TO MODERN TRAFFICKING?
WHY NOT CALL THE POLICE?
Local law enforcement is not responsible or properly equipped to combat or protect an individual from cyber crimes. The recommendation by police will always be to contact the FBI.
Unfortunately, the FBI does not take appointments for individual cases of hacking, and you cannot walk into any FBI office anywhere in the United States to speak to an agent face to face. Over the phone, they do not accept reports verbally (even when a person has info on dead cops). If you get them on the phone, they advise victims to submit a report online to tips.fbi.gov or to their internet crimes division IC3.
RESET YOUR PHONE/COMPUTER or BUY A NEW PHONE/COMPUTER
If a trafficker has committed enough time and money towards becoming a victim’s handler, they’ll invest the further time and money required towards taking control of any new device purchased by the victim.
Resetting a device can clear the device of spyware in some instances. In other cases, the spyware will actually be embedded on the recovery partition of a device’s disk, and/or on a hidden pre-boot partition added to the device. This means the spyware will automatically re-install itself on the device after performing a factory reset of the device and the victim will have effectively wasted the time it takes to re-install and log in to everything on the device for no benefit to them.
HOW CAN A TRAFFICKER USE A VICTIM WITHOUT WAKING THEM?
Several methods can be applied to physically move, rape, or surgically modify/implant a victim without them catching a single glance at the trafficker.
- Communication: The ability of a victim to communicate with friends or family who would try to help them can be limited or removed entirely
- Emergency: Access to emergency services (911) can be limited or removed entirely.
- Here’s an article about vulnerabilities of the 911 operating system to hackers
- Traffickers can also re-direct a victim’s 911 calls to fake dispatchers who will not provide appropriate service, or will relay the call to an actual dispatcher if the victim’s trafficker deems it necessary for police/paramedics to be present. There’s entire organizations accessible through the dark web who are paid to illegally operate as fake dispatchers!
- Activity: Day-to-day activities are reliant on usage of smartphone apps (uber, online banking / digital wallets, cellular provider settings, Apple/Google Maps). If they’re inoperable, the victim remains at the mercy of the trafficker and cannot accomplish their task.
- Location: a phone’s GPS location gives the trafficker the ability to follow the victim both virtually and physically. If Apple/Google Maps is used by the victim for navigation, the trafficker can call the destination business or individual ahead of time to manipulate the victim’s future interaction. Simply calling the business or individual and coercing them with money, threats, or deceit requires nothing but charisma and a couple minutes of time.
- Work Stability / Income: In many professions, computers play a vital role in performing job tasks. This can be limited, delayed, or removed entirely by traffickers. Seeking employment and/or securing new sources of income can also be difficult or impossible dependent on the trafficker’s discretion.
WHY NOT CALL THE POLICE?
Local law enforcement is not responsible or properly equipped to combat or protect an individual from cyber crimes. The recommendation by police will always be to contact the FBI.
Unfortunately, the FBI does not take appointments for individual cases of hacking, and you cannot walk into any FBI office anywhere in the United States to speak to an agent face to face. Over the phone, they do not accept reports verbally (even when a person has info on dead cops). If you get them on the phone, they advise victims to submit a report online to tips.fbi.gov or to their internet crimes division IC3.
RESET YOUR PHONE/COMPUTER or BUY A NEW PHONE/COMPUTER
If a trafficker has committed enough time and money towards becoming a victim’s handler, they’ll invest the further time and money required towards taking control of any new device purchased by the victim.
Resetting a device can clear the device of spyware in some instances. In other cases, the spyware will actually be embedded on the recovery partition of a device’s disk, and/or on a hidden pre-boot partition added to the device. This means the spyware will automatically re-install itself on the device after performing a factory reset of the device and the victim will have effectively wasted the time it takes to re-install and log in to everything on the device for no benefit to them.
HOW CAN A TRAFFICKER USE A VICTIM WITHOUT WAKING THEM?
Several methods can be applied to physically move, rape, or surgically modify/implant a victim without them catching a single glance at the trafficker.
- Anesthesia: if the trafficker can place a mask on the victim without waking them up, they can induce an unconscious state before proceeding to use the victim.
- Tranquilizer: A thin needle of a tranquilizing drug/chemical injected into a less sensitive part of the victim’s body can allow them to put the victim under as well. The calves, upper back, glutes, or any other area of the body that is difficult for the victim to notice a potential small mark from the needle is less likely to cause panic in the victim.
- Sleeping Gas: Sleeping gas is an oneirogenic general anaesthetic that is used to put subjects into a state in which they are not conscious of what is happening around them (Here’s more detailed info on Sleeping Gas)
- Chloroform: Sprayed directly on a victim or onto a cloth held to the victim’s face to induce unconsciousness.
ANYTHING YOU THINK YOU KNOW ABOUT ME HAS BEEN FABRICATED.
Do not trust anyone who is advocating for publicly murdering me
I am the creator of this website and I am still living in the grasp of my traffickers. The lack of understanding of how it's happening is an on-going struggle for me when asking for help from government agencies or individuals. I have an incredible amount of examples of what is happening to show as proof, but I cannot seem to arrange a meeting to sit down and discuss it with anyone who can help.
Please contact me if you can help me get out of this situation. My devices are all monitored and communication is filtered before I receive it, so I might not get your call/text but I'm providing several other ways to contact.
Phone #1: (773) 461-9035
Facebook.com/DeeJayLind
https://www.facebook.com/PleaseSaveDeeJay
Twitter.com/SizzyPrincezz
Snapchat: PrincezzDanni
Hot.com/@PrincezzDanni
SissyPrincess.com
ChicagoTransBash.com
DaltonLind.com
CHECK OUT MY YOUTUBE VIDEOS
EVERYTHING ABOUT the TORTURE / TRAFFICKING / RAPE / CYBER-CRIME I've experienced in recent years is going to be added to ChicagoTransBash.com. The direct, un-tampered by guilty hackers URL being
sites.google.com/view/chitransbash
Please contact me if you can help me get out of this situation. My devices are all monitored and communication is filtered before I receive it, so I might not get your call/text but I'm providing several other ways to contact.
Phone #1: (773) 461-9035
Facebook.com/DeeJayLind
https://www.facebook.com/PleaseSaveDeeJay
Twitter.com/SizzyPrincezz
Snapchat: PrincezzDanni
Hot.com/@PrincezzDanni
SissyPrincess.com
ChicagoTransBash.com
DaltonLind.com
CHECK OUT MY YOUTUBE VIDEOS
EVERYTHING ABOUT the TORTURE / TRAFFICKING / RAPE / CYBER-CRIME I've experienced in recent years is going to be added to ChicagoTransBash.com. The direct, un-tampered by guilty hackers URL being
sites.google.com/view/chitransbash