A Postmodern Love Story How Romance Scammers Exploit the Online Dating Experience Through Simulated Love

Total Page:16

File Type:pdf, Size:1020Kb

A Postmodern Love Story How Romance Scammers Exploit the Online Dating Experience Through Simulated Love A Postmodern Love Story How Romance Scammers Exploit the Online Dating Experience Through Simulated Love The text messages above are copies of real messages sent by multiple romance scammers to the researcher and two participants. A Postmodern Love Story How Romance Scammers Exploit the Online Dating Experience Through Simulated Love Master Thesis Presented to the Faculty of Law, Economics and Governance Department of Global Criminology Cohort: 2019-2020 Date: 10-02-2021 First reader & supervisor: Dr. E. Krsmanovic Second reader: Dr. A.E. Laskai Hester Smeitink 5913241 [email protected] 2 Preface Before introducing you to my exciting topic, I would like to take a step back and reflect on what this process meant to me personally. I did this research and wrote this thesis in circumstances I had never faced before. I was grieving the loss of a parent, immigrating to another country, and like every person reading this, facing the consequences of a global pandemic. In fact, as I am writing this very paragraph, Austria is in a three week long ‘hard’ lockdown, which means that I am spending almost all of my time inside the four walls of my apartment. Throughout this strange time, this project formed a red threat, as it became a pleasant, constant factor in my life. There were always new ideas and connections to explore, new ways to improve my work, and new goals and deadlines to work towards. This helped me navigate these strange months. Nevertheless, doing qualitative research during a pandemic, a time during which we are told to avoid social contact, proved to be quite difficult. When it became impossible to pursue my original research topic in March, I looked into netnography and crimes that predominantly take place online. When I stumbled upon the online dating scam, a largely underexplored cybercrime, I decided to go for it. I was immediately drawn to the emotional aspect of the crime, as I realized that these scammers were not only after people’s money, but also after their hearts. Throughout these last months, I found myself inspired and motivated by every new story that was shared with me about this particular scam. Luckily for me, I found great respondents, who were so kind to give me their time and knowledge. For this, I am extremely thankful, because I fully realize that without them there would be no stories, no research, and no thesis. But as multiple participants told me: you have to experience being romantically scammed to truly understand it. I still hold this to be true, although I think, or sincerely hope, that I came close to uncovering their truths. As an anthropologist and criminologist, I namely always strive to make the unfamiliar familiar, to collaborate with my participants, and to let their stories guide me. Besides my respondents I am also thankful for those who helped me during this process. I would firstly like to thank my boyfriend, who is likely somewhat of an expert on the topic himself by now. He always listened to my worries and ideas and motivated me to keep going. Also a big thank you to Laura, my fellow anthropologist/criminologist in the making/thesis- buddy, with whom I exchanged many, many voice messages and phone calls. Without her these months would not have been as fun and productive as they were. Lastly, I would like to thank 3 my supervisor, Dr. Elena Krsmanovic. Her insight and knowledge pushed me to explore new concepts and to find new lenses through which I could look at my data. Her input truly improved the quality of this thesis and I remain inspired by her passion for cultural criminology. For those reading this who are not my respondents, I hope that by reading this thesis your interests are sparked as much as mine when I (first) learned about the online romance scam. For my respondents, I hope you can recognize the things you taught me, and that I did you justice in my honest endeavour to translate your experiences into something of cultural criminological meaning. Enjoy reading! 4 Index 1. Introduction ................................................................................................................................7 1.1 Social & Scientific Relevance ...................................................................................................9 1.2 Research Question ................................................................................................................... 12 1.3 Overview of the Thesis ............................................................................................................ 13 2. Methodology ............................................................................................................................. 15 2.1 Direction of the Research ........................................................................................................ 15 2.2 Quality of the Data .................................................................................................................. 16 2.3 Research Site........................................................................................................................... 16 2.4 Research Methods: The Interview............................................................................................ 18 2.5 Research Methods: Digital Ethnography .................................................................................. 19 2.5.1 Participant Observation..................................................................................................... 19 2.5.2 Catfish Connie .................................................................................................................. 20 2.5.3 Visual Content Analysis ................................................................................................... 21 2.5.4 Spatial Mapping ............................................................................................................... 22 2.6 Research Sample: Respondents & Experts ............................................................................... 22 2.7 Ethical Considerations: Covert Research, Informed Consent & Giving Back ........................... 26 3. Theoretical Framework ............................................................................................................. 29 3.1 Cultural Criminology & Postmodernity ................................................................................... 29 3.2 Hyperreality & Online Dating Scams....................................................................................... 31 3.3 Commodification & Online Dating Scams ............................................................................... 33 3.3.1 The Perfect Lens for Online Dating Scams ........................................................................ 35 3.4 Previous Research on Postmodernity & Online Dating ............................................................ 36 3.5 Criminology & Cybercrime ..................................................................................................... 37 3.6 The Anatomy of the Scam ....................................................................................................... 38 3.7 The Hyper Personal Model ...................................................................................................... 41 4. Empirical Chapter ..................................................................................................................... 44 The Functioning of the Online Romance Scam & its Exploitative Nature .......................................... 44 4.1 Whitty’s Model & Motivations to meet Online ........................................................................ 45 4.2 The (Not So) Ideal Profile ....................................................................................................... 46 4.3 The Grooming Process: The Ideal Partner ................................................................................ 47 4.4 The Grooming Process: Conversation & Isolation.................................................................... 49 4.5 The Grooming Process: Putting the ‘Romance’ in Romance Scam ........................................... 50 4.6 The Crisis ................................................................................................................................ 51 4.7 Sexual Abuse & Revictimization ............................................................................................. 52 4.8 The Smeitink Model ................................................................................................................ 54 5 4.9 Exploitation............................................................................................................................. 57 4.9.1 Exploitation: The Emotional ‘Hit.’ .................................................................................... 58 4.9.2 Exploitation: The Financial ‘Hit.’ ..................................................................................... 59 4.9.3 Exploitation: Additional Harms ........................................................................................ 61 4.9.4 Exploitation: The Story of R8 ........................................................................................... 61 5. Empirical chapter ...................................................................................................................... 63 Creating a Simulation of Love........................................................................................................... 63 5.1
Recommended publications
  • Westlife Album Download Zipl
    Westlife Album Download Zipl 1 / 4 Westlife Album Download Zipl 2 / 4 3 / 4 Download All Zip & Mp3 Westlife Songs 2020, Albums & Mixtapes From The Archive Of The Best Westlife Download Website HIPHOPDE.. Below are the links I got you. Westlife (1999) Westlife album = Download Track number: 19 songs. Download Size: Zip 94.60MB. Simple Way to Listen / Download Westlife by Westlife in mp3, FLAC, ogg, zip album and other supported formats. +. How to Listen / Download Westlife: - Scroll .... Westlife Spectrum Leak Album Download Tracklist: 1.Hello My Love 2.Better Man 3.My Blood 4.Dynamite 5.Dance 6.One Last Time 7.Take Me.. Stream and download this newly released music album from Westlife – Spectrum zip download [Zippyshare + 320kbps]. THE ALBUM HAS .... Download Album ▻▻ https://musicqbox.com/music/1458532587/spectrum #[]MP3[]# Westlife - Spectrum 2019 mp3 320 kbps. Listen free to Westlife – Westlife - Greatest Hits (Deluxe Edition) (Swear It Again, If I Let You Go and ... Do you know any background info about this album?. { RAR } Westlife [Download] Westlife RAR album download [MP3] Westlife { DOWNLOAD ALBUM } Westlife Album Download (Zip Album) .... Album Westlife 2011 - Greatest Hits (Deluxe). File Size: 282MB / RAR / (MP3/320K) Release (2011.11.18). GOOGLEDRIVE : DOWNLOAD.. Download All Westlife Songs 2019/2018 Audio Music on Gofreshnow… we impersonate a transformed example of Foreign Music to y' all, top ... Free mp3 album westlife coast to coast download. File Name: Free_mp3_album_westlife_coast_to_coast.zip. File Type: .zip (Zip Archive) Source Type: .... Westlife Coast To Coast album zip download, Pop/Rock, Electronic Coast To Coast download zip, Coast To Coast Album download zip 2000 320 Kbps.
    [Show full text]
  • Internet Fraud
    internet fraud Internet Fraud The term ‘internet fraud’ refers to any type of fraud scheme that uses email, web sites, chat rooms or message boards to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. internet fraud may include spam, scams, spyware, identity theft, phishing or internet banking fraud. spam scams Spam is a generic term used to describe The power of the internet and email electronic ‘junk mail’ or unwanted messages communication has made it all too easy sent to your email account or mobile phone. for email scams to flourish. These schemes These messages vary, but are essentially often arrive uninvited by email. Many are commercial and often annoying in their sheer related to the well documented Nigerian volume. They may try to persuade you to Scam or Lotto Scams and use similar buy a product or service, or visit a website tactics in one form or another. where you can make purchases; or they may attempt to trick you into divulging your bank More information about scams is available account or credit card details. from the Australian Competition and Consumer Commission (ACCC) SCAMwatch More information about spam is available website (www.scamwatch.gov.au) from the Australian Communications and the Australian Securities and and Media Authority (ACMA) website Investments Commission FIDO website (www.acma.gov.au). (www.fido.gov.au). Bizsafety | www.afp.gov.au 1 internet fraud Bizsafety suggestions to prevent spyware Phishing loss from Online fraud Spyware is generally considered to be Phishing is a technique used to gain • Consideration of using a low-limit software that is secretly installed on a personal information for the purpose of separate credit card for online computer and takes things from it without identity theft.
    [Show full text]
  • Shill Bidding in English Auctions
    Shill Bidding in English Auctions Wenli Wang Zoltan´ Hidvegi´ Andrew B. Whinston Decision and Information Analysis, Goizueta Business School, Emory University, Atlanta, GA, 30322 Center for Research on Electronic Commerce, Department of MSIS, The University of Texas at Austin, Austin, TX 78712 ¡ wenli [email protected] ¡ [email protected] [email protected] First version: January, 2001 Current revision: September 6, 2001 Shill bidding in English auction is the deliberate placing bids on the seller’s behalf to artificially drive up the price of his auctioned item. Shill bidding has been known to occur in auctions of high-value items like art and antiques where bidders’ valuations differ and the seller’s payoff from fraud is high. We prove that private- value English auctions with shill bidding can result in a higher expected seller profit than first and second price sealed-bid auctions. To deter shill bidding, we introduce a mechanism which makes shill bidding unprofitable. The mechanism emphasizes the role of an auctioneer who charges the seller a commission fee based on the difference between the winning bid and the seller’s reserve. Commission rates vary from market to market and are mathematically determined to guarantee the non-profitability of shill bidding. We demonstrate through examples how this mechanism works and analyze the seller’s optimal strategy. The Internet provides auctions accessible to the general pub- erature on auction theories, which currently are insufficient to lic. Anyone can easily participate in online auctions, either as guide online practices. a seller or a buyer, and the value of items sold ranges from a One of the emerging issues is shill bidding, which has become few dollars to millions.
    [Show full text]
  • Are the Auction Houses Doing All They Should Or Could to Stop Online Fraud?
    Federal Communications Law Journal Volume 52 Issue 2 Article 8 3-2000 Online Auction Fraud: Are the Auction Houses Doing All They Should or Could to Stop Online Fraud? James M. Snyder Indiana University School of Law Follow this and additional works at: https://www.repository.law.indiana.edu/fclj Part of the Antitrust and Trade Regulation Commons, Communications Law Commons, Consumer Protection Law Commons, Internet Law Commons, and the Legislation Commons Recommended Citation Snyder, James M. (2000) "Online Auction Fraud: Are the Auction Houses Doing All They Should or Could to Stop Online Fraud?," Federal Communications Law Journal: Vol. 52 : Iss. 2 , Article 8. Available at: https://www.repository.law.indiana.edu/fclj/vol52/iss2/8 This Note is brought to you for free and open access by the Law School Journals at Digital Repository @ Maurer Law. It has been accepted for inclusion in Federal Communications Law Journal by an authorized editor of Digital Repository @ Maurer Law. For more information, please contact [email protected]. NOTE Online Auction Fraud: Are the Auction Houses Doing All They Should or Could to Stop Online Fraud? James M. Snyder* I. INTRODUCTION ............................................................................. 454 II. COMPLAINTS OF ONLINE AUCTION FRAUD INCREASE AS THE PERPETRATORS BECOME MORE CREATV ................................. 455 A. Statistical Evidence of the Increase in Online Auction Fraud.................................................................................... 455 B. Online Auction Fraud:How Does It Happen? ..................... 457 1. Fraud During the Bidding Process .................................. 457 2. Fraud After the Close of the Auction .............................. 458 IlL VARIOUS PARTES ARE ATrEMPTNG TO STOP ONLINE AUCTION FRAUD .......................................................................... 459 A. The Online Auction Houses' Efforts to Self-regulate...........
    [Show full text]
  • Cyber Romance Scam Victimization Analysis Using Routine Activity Theory Versus Apriori Algorithm
    (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 12, 2018 Cyber Romance Scam Victimization Analysis using Routine Activity Theory Versus Apriori Algorithm Mohd Ezri Saad1 Siti Norul Huda Sheikh Abdullah2, Mohd Zamri Murah3 Commercial Crime Investigation Department Center for Cyber Security Faculty of Information Royal Malaysia Police, Bukit Aman Science and Technology Bangi, Kuala Lumpur, Malaysia Selangor, Malaysia Abstract—The advance new digital era nowadays has led to These cyber romance scams has fraud Australians out of the increasing cases of cyber romance scam in Malaysia. These millions every years [1], [5]. No exception to Malaysia that technologies have offered both opportunities and challenge, has been the top 6 countries that recorded highest number of depending on the purpose of the user. To face this challenge, the cybercrime cases, with total loses reaching RM1 billion key factors that influence the susceptibility to cyber romance (Source: Bernama Report in 2014). Other countries like scam need to be identified. Therefore, this study proposed cyber Taiwan, China, Thailand, Indonesia and Hong Kong also were romance scam models using statistical method and Apriori listed together. While, Sophos Threat Report in 2014 stated techniques to explore the key factors of cyber romance scam that cybercrime attacks have been increased in the first quarter victimization based on the real police report lodged by the of 2014 and 81% of them happened in Malaysia. This victims. The relationship between demographic variables such as phenomenon was in line with the rapid growth of Malaysia's age, education level, marital status, monthly income and independent variables such as level of computer skills and the digital economy [6].
    [Show full text]
  • Internet Fraud
    Internet Fraud Internet Fraud is ever increasing as Fraudsters continue to find new ways of using the Internet to scam innocent consumers. Fraud over the internet is popular because of its anonymity and ease of promotion, and its lack of borders. It used to be that fraudsters required intelligence to persuade people face to face. With the increase of the internet, comes an increase of fraud - and these fraudsters no longer need to be persuasive, just persistent and patient. Fraud on the Internet includes, but is not limited to: fraudulent or fake web sites, untrustworthy websites, phishing (fishing) for personal information with fraudulent emails, Online auction frauds - buyers and sellers, increased Nigerian 419 Advance Fee Fraud, Lottery Advance Fee Scams, Business Opportunities & Work from Home Scams, International Modem Dialing and Cramming, and credit card fraud. There has been a huge increase in the types of frauds that gain personal information, which is then used or sold for the purpose of identity theft. Advance Fee Fraud, also called Fee Fraud, is any scam that in exchange for a fee: • Promises to send you money, products, or services; • Offers you the opportunity to participate in a special deal; • Asks for your assistance in removing funds from a country in political turmoil; or • Asks for your assistance to help law enforcement catch thieves. (Click here for more information.) If the fraudsters are lucky enough to scam the consumer out of cash, then that is a small bonus to compliment the personal details they have extracted from the consumer - these can include bank account and credit card details, passport numbers, social security numbers etc.
    [Show full text]
  • Employee Fraud Detection Under Real World Conditions
    Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2010 Employee fraud detection under real world conditions Luell, J Abstract: Employee fraud in financial institutions is a considerable monetary and reputational risk. Stud- ies state that this type of fraud is typically detected by a tip, in the worst case from affected customers, which is fatal in terms of reputation. Consequently, there is a high motivation to improve analytic de- tection. We analyze the problem of client advisor fraud in a major financial institution and find that it differs substantially from other types of fraud. However, internal fraud at the employee level receives little attention in research. In this thesis, we provide an overview of fraud detection research with the focus on implicit assumptions and applicability. We propose a decision framework to find adequate fraud detection approaches for real world problems based on a number of defined characteristics. By applying the decision framework to the problem setting we met at Alphafin the chosen approach is motivated. The proposed system consists of a detection component and a visualization component. A number of imple- mentations for the detection component with a focus on tempo-relational pattern matching is discussed. The visualization component, which was converted to productive software at Alphafin in the course of the collaboration, is introduced. On the basis of three case studies we demonstrate the potential of the proposed system and discuss findings and possible extensions for further refinements. Posted at the Zurich Open Repository and Archive, University of Zurich ZORA URL: https://doi.org/10.5167/uzh-44863 Dissertation Originally published at: Luell, J.
    [Show full text]
  • Computer Crime and Computer Fraud
    Computer Crime and Computer Fraud University of Maryland Department of Criminology and Criminal Justice Fall, 2004 Report to the Montgomery County Criminal Justice Coordinating Commission By Michael Kunz & Patrick Wilson This report was prepared in part as fulfillment of requirements in CCJS 604 and CCJS 605 for the Professional Masters Degree in the Department of Criminology and Criminal Justice. We express thanks to Dr. Charles Wellford, Dr. Doris MacKenzie, and Jean McGloin for assistance with this report. 2 Executive Summary The past several decades have brought a vast increase in the availability of electronic resources. With this increased availability has come a new form of criminal activity that takes advantage of electronic resources, namely computer crime and computer fraud. Currently, these new forms of crime are burgeoning and pose a new and lasting challenge to law enforcement agencies at all levels in how to prevent, investigate, and prosecute these crimes. Law enforcement agencies from the local to the federal level are beginning to institute specific units devoted to handling computer-related offenses, but there does not currently exist a uniform method to define and address computer crime and computer fraud. With this case study, we intend to analyze what the current level of understanding is regarding computer crime and computer fraud, as well as what is being done by law enforcement agencies to deal with these offenses. Using this information, we provided specific recommendations regarding computer-related offenses in the future including: • Uniform definition • Organizational requirements and procedures • Tools necessary to successful operation of computer crime units 3 Introduction Throughout the past several decades there have been numerous advances in electronic resources.
    [Show full text]
  • Why Online Auction Fraud Should Be Regulated Miriam R
    Maurice A. Deane School of Law at Hofstra University Scholarly Commons at Hofstra Law Hofstra Law Faculty Scholarship 2002 E-Buyer Beware: Why Online Auction Fraud Should Be Regulated Miriam R. Albert Maurice A. Deane School of Law at Hofstra University Follow this and additional works at: https://scholarlycommons.law.hofstra.edu/faculty_scholarship Recommended Citation Miriam R. Albert, E-Buyer Beware: Why Online Auction Fraud Should Be Regulated, 39 American Bus. L.J. 575 (2002) Available at: https://scholarlycommons.law.hofstra.edu/faculty_scholarship/423 This Article is brought to you for free and open access by Scholarly Commons at Hofstra Law. It has been accepted for inclusion in Hofstra Law Faculty Scholarship by an authorized administrator of Scholarly Commons at Hofstra Law. For more information, please contact [email protected]. E-BUYER BEWARE: WHY ONLINE AUCTION F'RAUD SHOULD BE REGULATED Miriam R. Albert" INTRODUCTION Well-settled principles of law, such as those encompassing fraud in its various forms, have long maintained their vitality, adapting to changes in the legal and business environments through judicial and legislative interpretation and intervention. Many of these changes have manifested themselves in the world of commerce. The creation and development of the Internet has resulted in significant changes in the way people engage in commerce. The increasing popularity of the Internet as a medium of commerce has generated an increase in Internet fraud, raising new and challenging legal issues in areas including online auctions. Under current law, a defrauded partici- pant in an online auction transaction has no recourse against the online auction site that facilitated and controlled the auction transac- * Assistant Professor of Legal and Ethical Studies, Fordham University School of Business; LL.M., New York University, 1997;J.D.
    [Show full text]
  • Songs by Title
    16,341 (11-2020) (Title-Artist) Songs by Title 16,341 (11-2020) (Title-Artist) Title Artist Title Artist (I Wanna Be) Your Adams, Bryan (Medley) Little Ole Cuddy, Shawn Underwear Wine Drinker Me & (Medley) 70's Estefan, Gloria Welcome Home & 'Moment' (Part 3) Walk Right Back (Medley) Abba 2017 De Toppers, The (Medley) Maggie May Stewart, Rod (Medley) Are You Jackson, Alan & Hot Legs & Da Ya Washed In The Blood Think I'm Sexy & I'll Fly Away (Medley) Pure Love De Toppers, The (Medley) Beatles Darin, Bobby (Medley) Queen (Part De Toppers, The (Live Remix) 2) (Medley) Bohemian Queen (Medley) Rhythm Is Estefan, Gloria & Rhapsody & Killer Gonna Get You & 1- Miami Sound Queen & The March 2-3 Machine Of The Black Queen (Medley) Rick Astley De Toppers, The (Live) (Medley) Secrets Mud (Medley) Burning Survivor That You Keep & Cat Heart & Eye Of The Crept In & Tiger Feet Tiger (Down 3 (Medley) Stand By Wynette, Tammy Semitones) Your Man & D-I-V-O- (Medley) Charley English, Michael R-C-E Pride (Medley) Stars Stars On 45 (Medley) Elton John De Toppers, The Sisters (Andrews (Medley) Full Monty (Duets) Williams, Sisters) Robbie & Tom Jones (Medley) Tainted Pussycat Dolls (Medley) Generation Dalida Love + Where Did 78 (French) Our Love Go (Medley) George De Toppers, The (Medley) Teddy Bear Richard, Cliff Michael, Wham (Live) & Too Much (Medley) Give Me Benson, George (Medley) Trini Lopez De Toppers, The The Night & Never (Live) Give Up On A Good (Medley) We Love De Toppers, The Thing The 90 S (Medley) Gold & Only Spandau Ballet (Medley) Y.M.C.A.
    [Show full text]
  • Romance Scams Spotlight
    Romance scams take record dollars in 2020 They say love hurts. With romance scams that’s obvious reason may be the pandemic limiting our doubly true – hearts are broken and wallets are ability to meet in person. But outside the pandemic, emptied. For three years running, people have reported the share of people who have ever used an online losing more money on romance scams than on any dating site or app has also been rising.3 And romance other fraud type identified in Sentinel.1 In 2020, scammers are primed to take advantage. Scammers reported losses to romance scams reached a record fabricate attractive online profiles to draw people in, $304 million, up about 50% from 2019. For an often lifting pictures from the web and using made up individual, that meant a median dollar loss of $2,500. names. Some go a step further and assume the From 2016 to 2020, reported total dollar losses identities of real people. Once they make online increased more than fourfold, and the number of contact, they make up reasons not to meet in person. reports nearly tripled.2 The pandemic has both made that easier and inspired new twists to their stories, with many people reporting It is reasonable to wonder: what happened in 2020 to that their so-called suitor claimed to be unable to make these dollars losses continue to spike? An travel because of the pandemic. Some scammers have Consumer Protection Data Spotlight | February 2021 1 reportedly even canceled first date plans due to a the card’s PIN number to the scammer.
    [Show full text]
  • Hello My Love! My Name Is Tessa Ridley and Iam a Self Care Educator & Health Care Professional from Vancouver, British Columbia, Canada
    HELLO MY LOVE! MY NAME IS TESSA RIDLEY AND IAM A SELF CARE EDUCATOR & HEALTH CARE PROFESSIONAL FROM VANCOUVER, BRITISH COLUMBIA, CANADA. WELCOME TO MY SCHOOL OF MYSTERY. I WANT TO TELL YOU HOW GRATEFUL I AM THAT WE GET TO SHARE THIS KNOWLEDGE BETWEEN OUR HEARTS. EVERY THING THAT IAM SHARING WITH YOU IS INFORMATIONT THAT HAS ASSISTED ME IN OVER COMING A LIFE LONG BATTLE OF ADDICTION & SELF HARM. EVERY THING I SHARE HAS HELPED ME DISCOVER MY TRUE SELF. BEING BORN INTO A WORLD WHERE NO ONE SEEMS TO TEACH US ANYTHING UNLESS WE PAY FOR IT HAS LED ME TO BECOMING A SELF STUDIER … A SCIENTEST OF MY OWN EXISTENCE. I TRY NEW THINGS TO LIVE NEW LIFE. I TRY NEW THINGS TO GROW AND TO EVOLVE AND TO EXPAND AND TO KNOW MY POTENTIAL. IN THIS SPACE, WE ARE SAFE TO HOLD OURSELVES CLOSE, PERHAPS FOR THE FIRST TIME EVER. I BELIEVE IT IS TIME THAT WE ALL LEARNED HOW TO BECOME OUR OWN MOTHER / LOVER / BESTFRIEND. I FEEL COMPELLED FROM WITHIN MY SOUL TO SHARE THIS INFORMATION WITH EVERY PERSON WHO IS WILLING TO OPEN THEIR EYES TO SEE AND EARS TO HEAR, IN A NEW WAY:: TO PUSH THE BOUNDARIES OF THEIR KNOWLEDGE & BELIEF SYSTEMS:: TO ALLOW NEW INFORMATION TO COME IN. AS HUMANS BORN ON EARTH, WE HAVE NOT BEEN TAUGHT HOW TO LOVE AND HONOR OURSELVES, WHICH IS WHY AS A CULTURE WE STRUGGLE SO HARD WITH MAINTAINING A BALANCE BETWEEN OUR BASIC HUMAN NEEDS WHILE WORKING LIKE ROBOTS NON STOP.
    [Show full text]