Sunday, September 15, 2024

Eugene Police Department Refers Gregory Wolfe Hacking Case to FBI

Greg has been "editing" this document, even deleting items, for nearly a year, to try to make it look haphazard and to bury his footprint and his scary interest in children. I try to fix it when I can. 


This post, previously called "A Christian Leader's Life, 1, 2, 3, 4, and 5" remains offline, but at least 10,000 people have viewed these pages nevertheless. I have reposted it under this new title.

"You are obviously the victim of a crime," wrote Oregon attorney John Walsh in April 2024

"I wouldn't put up with this either," said Judge Charles Carlson in 2022.

There is a general smell of murder in this hacker's work, even the threat to harm a child.


                 A Christian Leader's Life, 5 


                                 FBI News
December 14, 2024. After a review of these materials, a Eugene Police Department supervisor, CSO Kelsey Anderson, yesterday said this case is "beyond our expertise" and had already referred it to the FBI. That's great news. But it's also true that the FBI doesn't usually take hacking cases that lack IPs or obvious threats like "I'm going to kill you"--good news to hackers who are high-tech, careful, oblique, and mostly hidden. 

A bright and not strictly a procedural thinker, Officer Anderson has taken a long look and found alarming and dangerous threats in these pages. Maybe someone at the FBI will give it some time too.


_________________________________________

(I feature this 9/20/24 entry to showcase a death image of a child, and a 2/7/25 post that presents my hacker's ongoing theme of dead kids. Other entries in this section are also highlights.)


Gregory Wolfe Continues to Use Death Images to Harass Me and My Family
September 20, 2024. Greg has communicated his death wish for me a thousand times--and threats against my son. One of his favorite places to do this is on my Facebook friends list. Here is a pic of a tiger pursuing Winnie the Pooh--an attempt to keep it light--and next to it is a body lying on its face in cruciform, possibly a child's body, if you look at the ankles. It's probably not a dead body, but it suggests the appearance of one, and that's what matters to Greg. Take a look at the comments on the second photo. "Nailed it!" It might be AI-generated.

I have never seen these "friends" before. I believe Gregory Wolfe has swapped my actual friends for these friends. 



[Greg has edited the above narrative, removing any mention of a child. I restored it.]

My screen shot seems to have been darkened and blurred, when compared to the profile pic (I had blocked this profile, so I looked it up on my ex's computer). Greg often blurs posts I include on my blog, possibly to make them harder to see, so that I have to repost.


As I have mentioned in earlier sections of this post, he hacks into my Facebook app, not into the Facebook website. Please view another Facebook hacking incident in which he placed the FB profile of my friend (who had committed suicide a year earlier) in three different positions in my Facebook friends profile lineup, as a threat to me and a meaningful invitation. He also likes to show me what he's doing, even while trying to hide.


                            More Dead Kids
February 7, 2025. I Googled Anne Lamott, but I hadn’t read her for twenty years, so I couldn’t recall her name. Her quote that yelling at her son made her feel like she was bitch slapping ET is a famous and funny one. But I got a bunch of stuff on the search results that looks like presents from Greg. Most of it is Greg’s favorite theme: dead kids. He’s certainly going to want revenge at this time. (The one entry about "my adult son" doesn't clear Greg of his repeated attack on me and my family).

The Google search did find the quote and the author. You may have noticed, when you search this and that, Google doesn't throw in other random results about dead kids and suicide. But Greg certainly does. 

Some of the screenshots didn't stick, so I returned to the search and screenshotted those too.











         Revision of Revised Amazon Numbers
February 1, 2025. After I complained about my fake Amazon numbers yesterday, the Kindle category dropped from seven million to three million. That's quite a jump, just as moving from two million to seven million was quite a jump the other day. 

[Note]. As of 3/13/25, my Amazon numbers in hardback and paperback have soared to 6 to 7 million across the board. Until this change, all categories hovered around two million. These numbers move slowly--they don't spike upwards by the millions. Check out Greg's frequent manipulations of numbers and etc. on other public sites listed here, such as Blogger where he manipulated tracking numbers, deleted all of my followers, and placed his face on my blog as a warning. As I have mentioned, he even deleted my likes on my Facebook Fiction Titles page--an action of great pettiness. It might sound silly to complain about Facebook interference, but Greg uses that site and others to conduct his hacking. Some of his hacks include more death images, and they are recorded here.

Here is a screenshot of the hardback category of Horses All Over Hell, approaching eight million! I check these numbers often. Two million has been the count across categories for years, even when sale were slow. Now that my publisher has told me that I had good sales after my book review in the Canada newspaper in late 2024, my numbers have jumped to millions. Amazon behaves in all kinds of strange ways lately, because Greg controls it.



Meanwhile here is a screenshot of the disgraced Gregory Wolfe's Amazon page. Many thousands of his audience have turned away--he hasn't been able to get a speaking engagement nationally for years--but his numbers have only improved lately, as if by magic or fervent prayer. I don't believe many people would buy it.



Greg also controls my Google Control Panel and Amazon account, though he hasn't been my publisher in years, so that he can make demeaning banners for me. On my Google page, he displays the only bad review I ever got. Google wouldn't do that. He's a high-tech groper, and he goes where he pleases.


                  Wipf & Stock Hacked Again
March 3, 2025. Here are photos of my most recent book at Wipf & Stock and the "Related Titles" page. The related titles page shows books that are not at all related to my book. For years, until a week ago, the related titles page has shown Down in the River, my first published book at Wipf & Stock, when Gregory Wolfe was the editor of the imprint Slant Books. 

I believe this is a Gregory Wolfe hack. Ever since he and Wipf & Stock parted ways, he has hacked the publisher in large and small ways. I have discussed his hacks at Wipf & Stock elsewhere in this larger post, including a nasty targeting of the CEO. 

Wipf & Stock has copies of Down in the River they'd like to sell, but Greg wants to erase it from memory.

I requested to leave Greg's W & S imprint, Slant, in 2020, and two years later he turned me loose, making it look like it was his idea. Greg told my publisher that he had "canceled" the title. Everything is always a deception with Greg, a sneakiness of appearances. 





[Note]. Greg added more books to my related titles on 3/5/25. He is fond of presenting the jungle cat image, as if to show that he's a vicious animal that will have his prey--he presents this image often, including on the FB profile beside the one that uses the child death image above. 

The jungle cat is a 1970s concept, man as sexy predator and super-stud, in control of everyone, grabbing pussies and knocking guys around (he bullies people digitally and anonymously, when possible). He tries to engage in all of these behaviors out of view of the public, of course, but he gets caught now and then, such as his sexual manipulation of the Image women when he got fired, beginning his spiral as a Christian leader due to his own actions. 

Don't underestimate his rage. He can go ballistic over a disagreement. But I have exposed his behaviors to thousands of people. Naturally, he's especially furious, and he's unwell. His willingness to threaten my small son in this fight demonstrates this. In addition, he communicates with oblique images, whether it's the promise of death, murder, hospitalization, what have you. He's not one to come out and say such things directly. This document shows repeated behaviors and many patterns.




                         Greg's Christian Purity
March 16, 2025. Back in 2017, Greg objected to the Image women's inclusion of a photo of a woman breastfeeding. This photo was kicked down the Google pages. Though it was a controversial issue, the image wasn't available on Google. He is able to delete or drop anything on Google. After the publication of this picture in Image, it was hard to find, and it's hard to find even now. 

This piece of censorship happened shortly after Gregory Wolfe was fired. I suspected the image would violate Greg's Catholic purity, this man who sends child porn and dick pics--what a joke. There is nothing pure or Catholic about this nasty porn man. But what is more sympathetic and good than presenting a woman breastfeeding in such an understated manner as this?


Greg is like so many good Christians of the Georgia Baptist community who in recent years have molested children and demanded to remain "Christian leaders." There is a sickness in these people, and it's time to call them out on their bullshit Christian purity. Never should a Christian abuser, who targets children, ever be allowed to tell others what is right or wrong. 


                  
Interaction with Eugene Weekly Editor
December 26, 2024. I ran into Camille, the editor of Eugene Weekly the other day, out front of the magazine's office--the one who agreed to do an article about my hacking months earlier but went silent. She was about to go into the office when I was stopping by to tell her the news about the police referral to the FBI. She seemed quite spooked. She put on a mask and didn't want to make eye contact. When I asked if she'd been hacked, she said, "Nope." 

After I told her the news, she said nothing. I said, "Well, it seems like a momentous development, right?"

"Thanks for stopping by," was all she said about it. "Thanks for stopping by."

You never know for sure what's going on with someone, but I have learned that the hacked do not like to talk about being hacked. Please see other posts about the Eugene Weekly. One involves the replacement of their voicemail system that an employee acknowledged wasn't their doing.


Greg Places His Face on My Blog as Warning.

March 20, 2024. Greg placed his face on my blog after I posted "A Christian Leader's Life." My blog has always used the picture on the top post for the site picture (after two or three days), no matter how popular a post below it might be. This Moses pic was on my blog for two weeks.




Deleted Blog Followers
March 11, 2024. Greg deleted all of my blog followers, a few hundred of them, presumably before this post about him went live. I noticed it a few weeks later. Only one follower remains, my ex-wife.




                         End of Featured Posts
_________________________________________


                 A Christian Leader's Life, 6                                    
    

                     Greg Blocks Messenger
April 1, 2025. Greg blocks my Messenger. It's not the first time, and it's not the first time somebody asked if it was Gregory Wolfe doing it.




                          Let Go at Sunbury
April 1, 2025. The editing process at Sunbury Press last week was a nightmare. One of my characters is a brash Israeli professor who is anti-PC. She says some inappropriate things in a scene at a college. My editor, Katerina, rewrote the scene so that the Israeli is actually the victim of non-PC language and feels disturbed about the patriarchy. Though I have two strong feminists in the book, I have other kinds of characters too. 

She was completely rewriting my characters! I wrote Katie, the assistant publisher, and she had no problem with it. She said the editors were trained to rewrite characters and scenes according to what was popular in publishing. Katerina had mostly done good edits, but her stern words, snarky remarks, and rewrites were all over my manuscript. 


I was bewildered that such censorship and whitewashing were allowed here. Later I told Katie I couldn't continue if ideologues would continue to rewrite my work. Coming up were two more rounds of editing. I hadn't even reached the halfway mark with Katerina as my editor.

Lawrence, the publisher,
wrote an email in a few days saying that he was releasing me from my contract. He said Katie felt I wasn't getting along.

It all seemed wildly unreasonable, as if something else was going on. In fact, Katie did seem a bit spooked before and during the editing process. In her emails, she seemed like someone entering a room and giving partial utterances and running away, when she had always been thorough. She seemed panicked. 

In addition, at this time, Greg had stopped hacking me for days--an uncommon break--as if he was engaged elsewhere.

Naturally, I thought of Greg when I was released from my contract. He has hacked Wipf & Stock, deleted my submission emails, and hacked editors who reviewed my books. It's hard to believe that he had a hands off approach to the publisher who was about to publish a book about him. I think it's likely Greg hacked Sunbury--his signature move to create panic. If he did hack them, it would make sense that he would back away from me while he did it.

It's possible they let me go for challenging their editing techniques, but I doubt it. That doesn't seem enough to me. It seems very off. It's true I'm only reading tea leaves here, but Katie's panic and Greg's unusual break from hacking me seem to point to the possibility that Sunbury was hacked. 
It's impossible to know for sure.




              Another Threat Against My Son
March 19, 2025. Greg creates frequent updates on my computer, new updates often appearing one day after an update. That's not supposed to happen. Today's update lasted forty-five minutes. At the end of it, the wallpapered photo of my son was gone. I'd call it a glitch if it happened once, but I believe it's part of Greg's ongoing campaign against my kid.

After Greg removed the photo of my son, I deleted screenshots cluttering my desktop and put this new wallpaper photo up. Then in minutes, this one was removed too.



This is what constant, ever-present harassment looks like. The new photo is gone.




                    Greg Helps Other Predators
March 20, 2025. I have a neighbor who has threatened my son twice for talking too loudly. He told me he’s going to “kill that…” He didn’t finish the sentence so it wasn’t a crime, the police told me. He’s a bloated, huge-assed man often singing soulful tunes that are quit audible in my apartment. He’s says he's a “strong Christian.” Wow.

My ex-wife spent thirty dollars on a video camera for me to put in my sill, to guard against him, and of course Greg disabled the camera, as he disables many things--you have noticed this if you've read these pages. My ex and I talked and texted about my neighbor, so Greg knew what was going on.

Greg is now known, rightly, as a child predator, a designation based on many other posts I've made, and it makes sense that he would defend other predatory Christian men. 
                  


                  A Christian Leader's Life, 1

Background: Judge Charles Carlson

March 11, 2024. In February 2022 I sought a restraining order against my hacker, my first publisher, Gregory Wolfe, after he'd been hacking me and sending me porn for eight years and obsessing about my son. The third judge I saw at Eugene Civil Court, Charles Carlson, was the one who believed the evidence I provided and didn’t simply throw it out because it lacked an IP address. High-level hackers don’t leave IPs. He said a restraining order was only granted for direct threat of violence. "But I wouldn't put up with this either," he said. "You need to sue this person." I chose to write a novel, "The Lord's Hacker," instead. 

I spent fourteen months working on this book, day and night. He hacked me especially hard while I was writing it. He hacks editors who contact me about my novels and stories, to turn them away from me. He's a malignant narcissist, and is very charming and likeable, even convincing.

I resist the idea that I harmed his reputation. He did that himself. The one-hundred scholars I updated regularly about him were open to my emails only after he was fired by his all-women staff at the literary journal he founded. He had tried to entice a young woman on his staff to his hotel room and blamed it on her when she said no. This was no sad dalliance or sympathetic mistake, but an abuse of power, especially since he gaslighted her after the event. 

The greatest advertisement regarding my hacker's reputation is his own behavior. 

In addition, these scholars are serious people, not frivolous souls amenable to baseless rumors. They are professors at Loyola, Purdue, Hillsdale, and elsewhere, and they listened to me because their vague suspicions about him had gathered into tangible facts at Image Journal

Writing to them over nine years was a rare gift of justice. All exceptions granted, our legal system tends to throw out hacking cases as a matter of course, and victims usually have no voice. 


Highlights

My hacker used spoofing tricks to send porn to my Latina date. He also used a spoofing technique to sour my relationship to my landlord and to try to get me kicked out of my house. He hacked the literary journal Hobart after the editor invited my submission. And he hacked a colleague of mine, J.T. Bushnell, after J.T. wrote about my fist book, in Poets & Writers. And his hacking sent me to the hospital for a week in October, 2023.
 
He also intercepted a police report I filed on his spoofing messages to my landlord, and changed my name on the form to her name, and this created confusion and discord. 

He has deleted or tampered with evidence in my ongoing communication with law enforcement. I describe these and other hacking incidents below. He has also revised earlier drafts of this document to convey a haphazard and frivolous intention.


Enemy Email

Everything started with the following email exchange, when my hacker was my publisher, in 2014.  

"You decide if you want to make an enemy of me or not," he said, all because I didn't want to write articles for Christian blogs. Some of his audience disliked my book, and he said he wanted to try to make me more "human" to his Christian audience.

The first email is mine, and the second is my hacker's, both from 2013. He had rejected my first two attempts to write blog posts, saying they should be lighter for his audience, and I was starting to feel "snotty"--his number one complaint about me.




It is telling that my hacker, a Christian leader, threatened to make me an enemy, simply because I disagreed with him. I figured he must really go through the roof if a person actually disrespected him.

He asked me to apologize--he emailed that he wanted to talk to me by phone to see if I was truly sorry. When he didn't follow through with the phone call but began dropping my Google content, I emailed him he wasn't any kind of Christian and told him to F-off.

The email in which he told me he wanted to talk on the phone to see if I was truly sorry was deleted. He has restored some of the emails he deleted, as if fearing getting caught, but has neglected to restore others.


Illegal Porn

In 2015, during the first year of hacking, I believe he sent me illegal porn via a spoofing technique. He was hacking my and my then-wife's phone and making our computers hiss. I contacted the FBI and Idaho state police. I believe he wanted to get me in trouble. He is the master of the spoof, presenting digital items that seem one way on the surface, but are something else underneath. Russian-style hackers use porn and illegal porn often, to terrify and silence. 

When I gathered a list of 100 Christian scholars and told them what my hacker was up to, a friend of  his said I was crazy and needed professional help. My hacker was considered an angel at this time. I laid off that email excursion until he got fired for sexual harassment two years later. 


My Hacker Fired for Sexual Harassment

In 2017, Wolfe was fired by his all female staff at his literary journal, Image (before he started running a publishing house) for challenging workplace and sexual harassment. One of his staff said he'd invited her to his hotel room when they were at a conference. When she said no, he blamed her and tried to convince her it had been her idea all along. He frequently made light of her working-class background and suggested she needed him to advance her career (his views about working-class people are similarly revealed in later interactions with me). 

In 2013 he had made a video of his staff at his literary journalall of the young women either showing their cleavage or revealing a flash of panties or placing their pencils between their teeth etc. He had put it on Facebook but it vanished in a week. A few thousand people must have seen the post, though perhaps it seemed pretty vanilla at the time--until the women came forward later.



Everyone Knows Someone Who was Hacked
My friend Michelle who works at Smith Family Bookstore was hacked for months in 2020. She's a pro-choice activist who had apparently angered some Christian right-wingers online. A drone followed her car at night. One night, when she dropped me off in Springfield, I saw the drone hovering high above a house across the street, its light blinking. Few believed her story. "You get an IP?" people asked like a mantra.

My friend Lisa in Denmark had two hackers ruin her business. They had shut down her Facebook by posting ISIS flags on it and pro-death remarks and more, until she fled to Italy. The police threw out her two-hundred pages of evidence because they were trained to require an IP address and ignored her personal testimony regarding these hackers that she knew. 

This IP-only philosophy gives a nod to all advanced hackers, aiding and abetting their crimes, for they always hide their IP addresses. The only hackers who get caught are beginners. 


My Hacker is Known for his Dick Pics

In 2017, when Gregory Wolfe was down after his firing, I found a Facebook page in his name that someone had made. There was a row of dick pics in the banner. I supposed this person who created the page had been the recipient of such pics, and I discovered later that my hacker uses them as a weapon. Though I don't take screen shots of anything that has pornographic images, I wish I had made an exception for that Facebook page.



Ashley Madison and "The Evil Dead"

Also in 2017, my hacker learned that my second wife (in 2005) had cheated on me with our landlord, and that I cheated back. He listens to my conversations. He placed an Ashley Madison ad on my site for two months, even though my AdSense wasn't turned on. 


In September 2017 he posted this image of me online. In an email I had sent to the Christian scholars, who tend to believe my accounting of events, I had said he was evil. My hacker generally says that what I say about him is true about me.




Wallpapered My Google Page with Porn Descriptions

In July 2019, Wolfe wallpapered about twenty pages of my Google pages with Danish porn descriptions. When anyone Googled my name, these porn descriptions came up, including some English words like cock and cunt. My name was in each description. I had asked my friends to Google my name, and these pages appeared for them to see too.







These screen shots were deleted from my phone. It's lucky that I had posted them in a private Facebook post.



Manipulates Dating Site

In May 2019 I dated a black woman through a website in Cincinnati when I was divorced. She was a Christian and wanted me to be one, and it didn't work out. In a few weeks, I looked at the dating site again and saw it was all very large black women who were looking only for sex, at least that was all I could see on the site. He seemed to say, Oh you want a black girl? Try one of these.



Sends Infected emails to My Student

My hacker's central strategy is to turn people away from me. In 2021, a private student named Arlene told me on the phone that she had received a handful of “spammy messages” that appeared to be from me, but they were slightly different than my gmail name. She said they were infected-looking. There was an added middle initial. "It looks like he's trying to turn me away from you."  



Places Alarming Books on my Amazon Page
On my Amazon page, my hacker has posted several books that sound like I am about to get hurt--one of his many subtle threats. He posted this one in August 2022. Notice the spelling doesn't justify its place on my Amazon page.




Suspicious Rejections

In February 2020, an Ooligan Press editor invited me to submit an unpublished manuscript, and returned a standard form letter after a few days. Since she had invited me to submit, it would be standard politeness to say "It's not good a fit, thank you for submitting"--something like that. Her silence reveals a pattern of editors going quiet even after they invited my work. I believe she was hacked and understood not to contact me.



Uses False Avatars
My hacker has used a hundred avatars to harass me. The following blog entry was posted in September 2021 and shot up to number one on my Google page overnight (That doesn't happen with a brand-new student blog with one post). 

Here "she" lists "a mild case of bipolar disorder" as my major literary accomplishment, no mention of my graduation at the Iowa Writers' Workshop, only negative or questionable achievements. This post was the first and only offering on the blog. (I have a manageable case of bipolar disorder, and have had two manic periods in my life. I haven't had a manic period since I began taking medication in 2010.)

This disparaging list reveals a bias against working class people and those who have struggled with mental health--a recuring theme with Greg.





Replaced links on My Website
At this time I discovered that the links on my blogs leading to my interviews and book reviews now led to professional janitorial services and "bathroom wizard" etc. when I clicked on them. I had started a maintenance job at the university. An Oxford graduate, Wolfe wants to remind everyone that he's in one class and the rest of us are in another, just as one of the woman at Image Journal conveyed in her own experience of him. 


Hacks Colleagues and Editors

In May 2021 J.T. Bushell published an article that mentions me in Poets & Writers, and was hacked as a warning to stay away from me. His many Poets & Writers articles were removed from his top Google page--all so that no one would see that he had written an article about me. JT, a friend, seemed spooked, and soon stopped communicating with me. I believe he was hacked severely and  understood he wasn't supposed to contact me.



In July 2021 I referred J.T. to the editor at Largehearted Boy in NYC, when J.T. and I were still in occasional contact, and he said he'd be glad to run a "Narrated playlist" from J.T. But he wouldn't return J.T.'s emails after that, or mine. I figured the editor had been hacked, since he'd always returned my emails, and I included him in an email I sent to the scholars about freedom of expression and the need to resist hackers, who want to control people for their own ends. Within a month, he ran J.T.'s playlist.



Phone Call from My Hacker
In March, 2022 I was in Dayton, Ohio where I was applying for a teaching job for one semester. The chair at a college there told me there were ten positions coming opening soon, and she said she liked my resume very much. The next day I called the chair and her secretary said there were no positions open. It was a nonsensical exchange that people who are hacked get used to.

That night while I was at a motel, Wolfe called in the middle of the night and said, "Wrong number, wrong number," and hung up. He has a distinctive voice, deep and pressurized. I would recognize it anywhere. I believe he wanted to communicate that I got the wrong number when I ever decided to send him my novel. I returned to Eugene.

It was hard to get teaching jobs in Oregon, and I knew Ohio was a good place to work as an adjunct.



First Threat Against My Son
In late March 2022 my hacker wallpapered the water-burial cover art of my book (a pic he helped to create) onto my son's computer. It was the day before I was scheduled to meet with the third judge, Charles Carlson. 

(In February, 2024, my hacker, Gregory Wolfe, deleted this picture from this site, along with the brief narrative that accompanied it, and deleted the picture from my laptop. He wants to use children as a harassment tool, but doesn't like being known for that. I found it elsewhere and put it back up on March 5th).

This is a picture of my son sitting in front of his computer.




Hacks My Publisher 
In May 2022 my Eugene publisher, the CEO of Wipf & Stock, called me and told me that my hacker had dropped my novel from his publishing house (I had requested to take back my book the year before). The CEO told me that Horses All Over Hell would remain at Wipf & Stock. He was friendly. I asked him if could get some "Horses"-themed bookmarks for my reading at Barnes and Noble.

When I went to the publisher to pick up the bookmarks a week later, I saw the CEO in the coffee shop on the floor below his offices, and he looked afraid when he saw me. He went out the door, and he never spoke to me again or returned any of my emails. He's one of the most gentle, good-natured people I've known, and I believe my hacker hacked him in retaliation for keeping "Horses" at Wipf & Stock. 

When I had dinner with the CEO in 2013, when my first book, Down in the River, was scheduled to be published (at this time my hacker's publishing house was an imprint of Wipf & Stock), he said he didn't much like working with the man who later would become my hacker. "He wants everyone to kiss his ring," he said.

This pattern is unmistakable: first an editor is friendly, and then he never talks to me again, though our interactions had been absent any tension. I'll always be enormously grateful to the CEO for keeping my book despite what must've been a difficult period of hacking and harassment. 



Professor Osteen Hacked
In March 2023 I wrote an email to the scholars on my email shoutout page in which I update them about my hacker. I thanked someone in the group for helping me figure out if they were receiving my missives, but I didn't mention a name. 


The same day, Mark Osteen wrote me and asked to be removed from the email list (after eight years). I told him that the emails were grayed out and I couldn't remove him now, but I'd keep trying. The next day he wrote, in all caps, "Please remove me from this list. I do not want to receive any more emails from you. Comply at last!" 

It seemed an exaggerated response for someone who had been with me since the beginning of my email list. I believe my hacker had gone hunting and found that Mark was a fiction writer and a professor of "neurodiverse" literature, and figured that he was the one who had helped me, and that he was weak and old enough to hack without consequence. I was soon able to remove his name. Mark is an elderly man, and I believe his behavior was evidence that he was hacked abusively that day. 


Spoofs Dick Pics to my Date

In December 2022 I met a Latina, Martha, who manages a bowling alley at Valley River Center.


When she and I began texting, she said she received "strange" pics, and said she liked the internet at first but now she didn't trust anyone. I never heard from her again. 



Hacked Editor Who Asked to See My Work
In September 2023, Elizabeth Ellen invited my submission of short stories to Hobart after we had emailed back and forth. Then she went quiet and has not contacted me since. Her enthusiasm was interrupted suddenly, and continues a pattern of sudden silence exhibited by editors I have contacted. I believe she was hacked and terrorized and knew not to have contact with me.




Uses Illegal Video as Terror Tool
In August 2023 my hacker sent me illegal content again, spoofing it as adult material. 



Spoofs My Facebook Friend Request
In August 2023 I tried to friend ten people who had made comments on a literary site. The next day, I received five new friends. They all lived in Mexico and they liked big construction trucks. I wouldn't mind being friends with them at all, but this shows that my hacker is not only a very good hacker, but also that he doesn't think much of the working class. I believe he was saying, These are the only friends I will allow for you


Another Editor Hacked

In October 2023 I was going to submit a story to my friend who runs a literary journal in Serbia. She had asked me to send a story, and seemed disappointed when I had told her I couldn't separate a story from my published book. Then I found two stories for her. In the exchange below, she reveals that she was being hacked. 








My hacker wants to shut down any notice I might receive, even in Serbia.

Psyops Noises Issue from My Computer

In September 2023 I had been writing "The Lord's Hacker" when Wolfe fixed my computer to make a strong rhythmic panting. I looked up the use of such noises and found it's a method of wearing a person down. This technique was used by American psyops teams in Viet Nam and is used by hackers. It sounds paranoid, but he has gone to extremes before. He uses the famous porn-bombing that hackers use, and other techniques to create anxiety, shock, and pain. On Facebook, in 2014, his wife had applauded his work ethic of never leaving his desk and rarely sleeping. He was indeed hacking at practically all hours, apparently while he administered his duties at his publishing house.


Hospital Stay

I had exhausted myself by writing "God's Hacker" day and night over fourteen months, and I was beat for a long while afterwards. This sound on my computer did wear me out. When a particularly brutal hacking came after I had finished my book, I entered the hospital. I was in the hospital for five days. When I got out, he played the panting sound on my computer and hacked me--the very day I got home! He only played this "music" when I was writing The Lord's Hacker.


Swaps Digital Info on Caller ID

In November 2023 my hacker switched the name of my doctor and my pest control in my phone's address book, to suggest that I needed to be treated like a pest. He often switches caller ID so I don't know who is calling. My digital world is so full of glitches, I don't believe in glitches anymore.



Friend Requests From Kids

In 2019, I received a friend request from a young woman, from the Philippines, who was in her twenties. She liked Dickens and Classical music. In a week her avatar changed to a twelve year old who "likes ice-cream cones." These friend requests usually have one mutual friend, but I believe he only makes it look that way. Below is a more recent request, from November 2023. It's possible to receive such things without my hacker's help, but I have received enough garbage like this to wallpaper a house.





Blocks My Phone Calls etc.

On January 8, 2024, he prevented six calls to the employment department. On my phone appears a card with a green button that says "Call failed."  

Also on the 10th, I inquired about an accommodation in the disability office--I had called earlier that morning--and when I left, I found an empty digital phone card that read, "Disabled." This card began to appear every other time I opened my phone, for two weeks.

Any one of these could be a glitch, but my hacker sends communication like this constantly.
Sometimes I can call my doctor's office, but it rings and rings. Or a robot answers and puts me in a cue, but it's not the standard music that my doctor's office plays, and no one ever picks up.








Spoofs My Landlord and Tries to Get Me Kicked out of My House

On January17 2024 I received a spam letter that stated my Facebook account was going to close. I took a screenshot of it. The next day I saw that the letter had been texted to my landlord from my phone, known as spoofing. But I hadn't texted her this.

When I tried to explain spoofing to her, she didn't understand it. She said, "This was obviously sent by you. I can see your email in the screenshot." Of course my folders are in the picture. I was the one who took the screenshot.

I tried to explain that a hacker has total control of your phone. He controls all your photos and screenshots, and all the functions. If you take a nude selfie, for instance, your hacker can send it to your husband's best friend, from your phone, so that it appears that you sent the pic. One purpose of spoofing is for a hacker to send disturbing images etc. to your boss, your spouse, your kid--to cause rancor and distrust in relationships, because such texts appear to come from your phone, your name. But it's just a spoof, a trick. Your hacker is the one who sent it.

My hacker wanted my landlord to believe that I'm the type of person who sends spammy, creepy, and threatening letters of this kind.




Police Report Interference
On January 25, 2024 I filed a police report about the spoofing that upset my landlord, filling in my name and address. When I tried to submit it, there was an error message. The next day my landlord told me the police called. She said I had put in her address and email, and said, "Why did you do that! Why did you put in my name? I'm not the kind who makes police reports."

At the very least, my hacker is certainly not being careful right now. His brand has tanked, and he blames me instead of his behaviors. He's doing things, with greater repetition, that he wouldn't have done last year.



Digital Touch: Greg Pretends to be My Son
That night I texted my son that I loved him and couldn't wait to see him again. Later I got a Digital Touch message from him, where he picks a color and touches that screen, and you touch it back. Only, he told me the next day that he didn't send anything like that, and had never downloaded that app. 

It was Wolfe, pretending to be my son! Yes, things are getting weird. No surprise, he deleted this digital touch exchange, and deleted the screenshot of it later. 



            Suicide Included in My “Friends”
February 12th Facebook shows friends who are recently active. Michael's profile appeared there today. He committed suicide many months ago. That is a pretty obvious message that my hacker is going to do his best to get me to follow suit, thus the psyops panting that he puts on my computer at all hours now.





Constant Social Media Censorship

In November 2023 I joined the Facebook page Beat Poems On the Road and was receiving 500 to 900 likes on my posts. The admin, Steff, got hacked and cut me off. In Facebook pages I frequent, my hacker often uses an avatar to bark at me and complain to the admin about me. If this doesn't work, he hacks them until they drop me. I have experienced this five or six times. In the case of Beat Poems, I believe he couldn't handle that I was getting so much exposure, and he had to put an end to it. 




In 2019 he began to create many avatars that would bark at me on social media. They always had brand new accounts created that day. By 2023, his avatars had posts that went down and down their pages, and were generally posted in a single day, as if created with the help of AI. If this activity sounds bizarrely petty, tedious, and unworthy of an Oxford graduate, I would have to agree.
 


Threat Against My Son and Tampering with Evidence

On February19th 2024 I emailed the scholars that I had a friend request from a very young prostitute. Her comment that she could “go as long as you want” struck me as false, something an old man would say when trying to sound like a young prostitute. I didn’t take a screenshot because she might have been underage. 

Seconds after I sent that email I received this “New Photo Memory” with my son’s picture on it. The trouble is, iphone memories are an iphone-inclusive feature, and they don’t send out such notices via email. The purpose was to send fear and alarm about my son’s safety. My hacker reviews my emails and was probably angry that I laughed at him about the prostitute avatar.

Then I emailed the scholars again, about his fake email containing the iphone memories. 

The iphone memories email was deleted that day. Luckily I had taken a screenshot as soon as I received it--but screenshots aren't always secure.

It wasn't until March 11 that I saw he had replaced my screenshot with another one. This new screenshot shows iphone memories as generated by iphone instead of the original email he had sent. This new screenshot also shows a two-minute lapse between when I sent the email about the prostitute and when he sent the iphone memories email. But when I had taken the screenshot, it recorded that only seconds had passed. This man has shown that he can put himself through quick tedium for his hacking work.

This is the screenshot that he replaced mine with. Instead of showing seconds on the bounce-back email, this one shows two minutes, enough time for him to swap the screenshot with a new one.



Since then, many other pictures of my son have popped up on my phone, seemingly generated by iphone, but the repetition is suspect. Iphone pictures appear once in a while, not all the time.



The Profile of My Lost Friend Appears Again
March 23, 2024. The day this post went live I found that my hacker once again included my friend who had committed suicide in my "friends" photos. He had removed my friend's profile after I first mentioned it, and now he added it again, though this time it was on the left instead of on the right. He likes you to see it's him doing these things, even while he covers his tracks. 

It was important for Wolfe to sneak in yet another of his murky but alarming death threats--a pattern that grows more menacing with the numbers of them. 






Reordering of Google Content
March 23, 2024. The Poets & Writers article about me, my reviews and interviews in Kirkus ReviewPaste Magazine, and Rain Taxi, should be at the top of my page. Instead, my one bad review in an unknown magazine, "Drowning in Confusion," has stood on page one like a sturdy tree over years. I don't care so much about prestige--unless someone is actively dropping content to serve his own interest.



This Post is Offline
March 25, 2024. This article, "A Christian Leader's Life in Censorship and Porn-Hacking," doesn't seem to exist on the internet, despite several hundred visits during the first and second week after it went live. After this post was live for a week, I Googled a handful of sections and saw that it seemed online, but it wasn't rising elsewhere on Google. 

But someone occasionally boosts my posts, so a lot more people have seen it anyway.





Restraining Order
On March 26, 2024 I was denied a restraining order, but the judge offered interesting words. She agreed that anyone sending me death images and porn and then multiple pictures of my son may indeed be psychotic and dangerous, but the Supreme Court's ruling in 2021 allows for much deviant behavior online.

One judge, in 2021, told me, when I mentioned my hacker's porn harassment online, "That's his free speech!"

There is something wrong with our laws on cyber harassment right now. We can't seem to locate a sensible position on the issue. When we police speech online, we tend to target political speech, so we correct that overreach by backing off and allowing ghastly crimes to go unchecked.

If someone sends you death images and porn and then twenty pictures of your son or daughter from your iphone memories, in meaningful and threatening repetition, not even the fiercest Libertarian would say, "Free speech! I love this!"

But I was pleased to hear this judge agreed that his behavior may well be psychotic and dangerous and that the internet is a running ground for criminals. At least she didn't pretend that all is well and that it's free speech. 


Contempt of Those Harmed by the Church
In a 2014 video, Gregory Wolfe spoke at a prestigious college--then an admired public figure, the founder of a popular literary journal. He talked about misguided souls who had left the church. "Someone in the church may have hurt them," he said in a silly and belittling manner, as if the vast underworld of abuse in the Catholic church amounted to mere cuffs on the arm on the school yard. His insensitivity to millions of victims, living and dead, must have made it easier to begin his own regimen of abuse.


Questions

I wanted to address any who might believe I have no evidence, simply because I lack an IP or a photograph of my hacker caught in the act. As Judge Charles Carlson told me at the hearing, I have evidence that would be persuasive in civil court, and my assertions raise many questions that point directly to Gregory Wolfe.

For instance, who placed Greg's picture on my blog for two weeks, a threatening gesture, after my post went live? Only my hacker would place his image on my blog.

Who removed the many followers of this blog before I posted "A Christian Leader's Life"? 
Some other nemesis?


Who took the post about Gregory Wolfe offline, so that it didn't interact with the internet and rise on Google? Who else would want to hide it?

Who deleted the emails from my hacker to me and then restored some of them but not all? Who else had a motive?

Who deleted my email containing the porn descriptions that my hacker used to cover my Google pages, the email I had sent to the scholars? Who else would want to?

Who edited "A Christian Leader's Life" a few times after it went live, to convey a frivolous and unedited and sometimes confusing vibe so that I had to keeping rewriting it?

Who replaced the screenshot of the fake email that contained the iPhone memory?

Who deleted the photo I took of my son sitting in front of his computer? It was wallpapered with my book cover art that my hacker had helped create. My hacker had the motive.

Who is so focused on my son that he has to keep sending me his pictures to convey a threat? Who else deletes his texts? Some other random hacker?

Who demeaned, repeatedly, working class people in fake blogs and on my blog, just as he demeaned the working class background of one of the women who fired him?

Who else would spoof my police report about my hacker, placing my landlord’s name and email and phone on the report?

What else would be interested in my communication about my hacker to the police?

If it was a different hacker, he must have been very sympathetic to Gregory Wolfe and spent a lot of time covering for him and concealing his crimes.



Fun Facts about Hacking
June 30, 2004. I have heard so many people over the years express doubts about a hacker's ability to control various worlds online and inside a computer. Someone on Facebook asked me, "So this person enters Facebook headquarters, and then what?" That's a common one. In fact, the hacker gets into your Facebook app. He doesn't need to go to 1 Hacker Way and get past Zuckerberg's karate moves. Once a hacker's in your computer, he can access everything that you do. He can see your screen the same as you do--if he's advanced, that is.

"Change your passwords." This is advice I've heard from tech people, many who make a lot of money. This advice is also a favorite of cops. Even IT "experts" will tell you that you need to change passwords often. You should change them to guard against low-level types. But advanced hackers use a technique called "forced entry" to bypass passwords. I remember when I was in Pittsburgh I was changing my passwords all the time, and that never worked. Greg may have some program that captures password changes. But don't forget, Russian and Chinese hackers have recently blasted their way into Pentagon computers, despite the most advanced defenses in the world, and owned them at every level. A really good hacker can certainly get into my computer and yours.

At any rate, yes, he gets into Gmail, Facebook, Blogger, LinkedIn--all of the apps.

Regarding his ability to reorder Google content, one person told me years ago, "I doubt he has access." Again, hackers hack. They don't ask for passwords or dig them out of your trash. I have documented that many items rise and fall rapidly on my Google pages. Greg even wallpapered my Google pages with porn descriptions--In 2019 I Googled my name and there they were (see below)--and it took three days for the junk to clear out. 

Many believe that the process of changing Google content involves greasing the algorithms and spending a lot of time finessing downward movement of content. The people at Reputation dot com don't use dark webs techniques, and if they do, they sure wouldn't want you to know it.

There's a lot of innocence about hacking. But things are changing. More people know what spoofing is now, for instance. The FBI knows that a spoofer owns your phone and can send your pictures of your naked body to your husband's friend, so it looks like you're sending it to flirt. And the FBI no longer says corny, low-level stuff like, "Did you change your passwords?"

If an IT dude who seems smart about defending your computer but has no experience dealing with an advanced hacker--if he tells you "nobody's getting in" and "change your passwords," I hope you'll be a bit skeptical. Be skeptical of me too, but at least I have had some experience with a master hacker, and I've shown fifty-plus pages of real-life hacks. It's true some of it is just based on my word. But most of it is based on alarming screenshots and narrative of my experience.

I don't wish to dismiss all IT people, only to say that most of them aren't ready to defend the Pentagon. But one IT guy I met actually had a lot of experience with hackers. He worked with a lawyer I employed last year. He was familiar with top-drawer hacking. When he looked at my GW post, he said it was obvious that I'm the victim of a crime. The lawyer said the same thing, but they asked for money I didn't have beyond the $700 I had already handed out. 

IT people repeat "change your passwords" like a mantra. That's wise, since you don't want a spammer to use your Gmail account to send out a thousand messages about flipping houses in your name. But anyone who knows about high-level hacking knows that hackers hack, and they don't need passwords.

A large part of Greg's hacking involves spoofing--especially a technique I call invisible layering. In other words, when I'm corresponding with someone in text, Greg can send items in my name that become part of the text on their end, but I can't see the additions on my end, in the text I'm writing. He can also prevent the recipient from receiving a part of my text. He has withheld my texts a handful of times with my son, and he sent dick pics to Martha from my phone (both of these I describe below). 



A Christian Leader's Life, 2


Places Face on My Blog as Warning

March 20, 2024. Greg placed his face on my blog after I posted "A Christian Leader's Life." My blog has always used the picture on the top post for the site picture (after two or three days), no matter how popular a post below it might be. This Moses pic was on my blog for two weeks.




Deleted Blog Followers

March 11, 2024. Greg deleted all of my blog followers, a few hundred of them, presumably before it went live. I noticed it a few weeks later. Only one follower remains, my ex-wife. 




Relinquishes Google Control Panel 
Then Takes It Back
March 11, 2024. In my post "A Christian Leader's Life 1," I stated that Greg had seized my Google control panel. I hadn't been able to access it for years. The information on it is inaccurate and out of date, and it says I write religious fiction. I don't. The day after my post, the control panel was finally restored to me, and I could at last make edits. 

But I knew something was wrong when I tried to edit my page. It gave me one narrow box in which to type edits. The only change it ended up making was a garbled line of nonsense added to the old bio, and it still says I write religious fiction. 

I have no doubt it was another Gregory Wolfe attack. Who else would relinquish my control panel the day after I said Greg still controls it? 



Eugene Weekly

March 27, 2024. After I posted "A Christian Leader's Life," the Eugene Weekly editor said she wanted to do an investigative article on Wolfe. When I called days later, I found a generic, robot voicemail and left a brief message. Later in the day it struck me as odd that the voicemail would be generic. He has placed fake voice systems on my phone before. 

I left my house, getting away from Wi-Fi, and called again, down the block. This time there was a real voice thanking the caller for contacting Eugene Weekly, but it was closed so I left no message. 

Greg has intercepted many of my calls, often just to be a creep, but sometimes to keep me from talking to someone he doesn't want me to talk to. 





Changing My Address on My Manuscripts

Wolfe often uses clever tactics when he's censoring, sometimes changing my address at the last second before I submit a manuscript. Thankfully Heresy Press, back in January, 2024, had a bounce-back email saying they received my submission of a manuscript. I downloaded my submission and saw Greg changed my name to the University of Oregon, and put in the address and number of the university as well. Here is the bounce-back email.





Removes My Bio from My Manuscripts
April 6, 2024. Greg often makes changes to my essays right before I submit them. In this case, I saw that my bio was removed from the manuscript I submitted. It should have appeared on the following page, but that page was deleted.



Here is a screenshot of that essay, with a bio at the bottom of it. The essay sits on my desktop with the bio on it, but Greg swiped it off at the last second before I submitted it. He devotes a lot of time to hacking me.






Deleted Texts
April 20, 2024. Greg sometimes deletes certain texts I send to my son. I have already mentioned his creepy Digital Touch fakery and his focus on my son's photos. Below is a picture I sent on Easter, but he never received it, nor the words that went along with it. Other texts between us have been deleted. If it seems silly to include a tree that looks like a bunny, I would argue that Greg is deeply out of touch with innocence, even while he advocates for the all the usual Christian morals and so on. Perhaps something flares up in him when he sees it expressed by someone he hates.





Eugene Weekly

May 17, 2024. Something is going on at Eugene Weekly. On March 11th, Camilla, the editor, emailed me that I was "on the list" for an investigative report about my hacker. But she was out of touch for two months. It started to seem very odd. I emailed, called, and left messages with her receptionist, seeking an update. But I was met with that familiar wall of silence that hacked editors put up. When I asked for an update about the article, she wouldn't give one. When I asked if she had been hacked, she didn't say. Frustrated by the silence, I let her know that I was placing this on my evidence list as a possible hacking, to give Camilla a chance to correct my assumption that she'd been hacked. 

Either she was hacked, or she's not very professional.





A Christian Leader's Life, 3


         Third Appearance of My Lost Friend 

June 11, 2024. For the third time, Greg has placed my friend Michael, who committed suicide a year ago, on my friend list. First he placed his profile pic on the bottom right, then on the bottom left, and now in the middle. Suicide and death images are among Greg's favorite messages as a Christian humanist. Farther below, I provide screenshots of the other times he placed his profile pic on my friends list. On this screenshot, Michael's profile is at the bottom center.





                        Rewrites My Email

June 15, 2024. Greg rewrote this email that I wrote to my friend Jose. I took his creative writing class for fun. You can only see the difference when you look at "Ryan Blacketter wrote," right below his response, at the bottom. Greg rewrote my initial email. He receives the emails I send to others, reviews them, deletes them, or rewrites them, before sending them to the intended recipient. He also receives emails that others send to me, and he doctors those, deletes them, or sends them to me. This is part of his censorship strategy. 

It's rare that I can actually see his doctoring. But this shows it. In addition, Greg seems especially to use my Hispanic and Black friends for his hacking fun. Compare my email, at the top, to the rewrite under "Ryan Blacketter wrote" at the bottom.



Interference with Job Applications

In January, 2024 I attended a community college part-time to take a few classes to improve my job prospects--if that's even possible with Gregory Wolfe's interference. Despite two masters degrees, I have experienced a lot of suspicious interference. Gregory Wolfe sends infected emails to employers in my name when I apply to positions to create alarm about me. 

In February 2023 the chair of Southern Oregon university English Department said, "I'm sure we can find you a few classes to teach," then went suddenly out of touch. 



        Disconnects Phone Call to Therapist
June 19, 2024. Greg disconnected my phone call with a therapist. When I spoke to her again, he turned the volume on and off, for much of the call--a technique he has used before. When I hung up with the therapist, I instantly received a meme that said “Don’t fight your demons," by Bukowski. I doubt Greg likes Bukowski, but he knows I do. It was as if Greg was saying, “Don’t seek improvement. Listen to my psyops suicide music." 



                Froze My Site Visit Counter

June 22, 2024. Right after I posted this today, I saw thirty people visited the site right away. Then the counter was turned off. That's Greg's way of staying in charge--again with the censorship. He also turned off my visit counter when I posted the two paragraphs from Poets & Writers last week. He doesn't believe anyone should get notice that's a little better than what he has. He's also angry about that post because he doesn't want to explain why I dumped Slant, especially since he pretended that it was his idea that I left--awkward! [The counter resumed six hours after this post went live].



Email Submission Deleted

June 22, 2024. A Portland publisher friended me on LinkedIn, and I misunderstood her words as an invitation to submit a book. I submitted my book "Karmina" by email. When I told the publisher later that I might have misunderstood, suggesting that she should ignore my emailed submission, she wrote that she hadn't received the email. 

I believe Greg deleted the email, or rerouted it to trash, as he has done with my submissions before. 




Porn Pages: A Psychology of Perverts
June, 28, 2024. Yesterday I found that a handful of prostitutes and a possible child page followed me on FB. They were all near the top of the Followers page, and the child page had a close-up pic of a girl’s mouth open wide, with a running video of a soldier, possibly Russian, holding a small, clothed girl below. There are sex workers who follow you on FB, it's true, but these were all up top of the page. I believe Greg wanted viewers to connect them to me.

When I blocked one young prostitute, my screen froze on my phone, but I was able to block the rest on my computer.



Ongoing Obsession with My Son

June 27, 2024. Below is another pic I sent to my son. Greg cut it on my son’s text page or routed it to trash. He didn’t receive it. Greg had also turned off notifications on my son’s phone so he doesn’t hear my texts. 



June 28, 2024. Greg deleted this polar bear photo from this site and from my desktop today, and I took another screenshot of it. He has deleted other photos related to his harassment concerning my son, as described elsewhere in this document, possibly because he doesn't think that obsessing about someone else's child is a very good look. He would be right.

Some radicals say that Christians are often perverts. It’s more accurate to say that perverts are often Christians. They need an identity behind which to hide. Most perverts understand they can’t live in society as the way they are. Some become Christian leaders. Christian author M. Scott Peck explores this phenomenon in People of the Lie.



Censorship Publisher
July, 2024. Greg continues to limit my Facebook posts. Recently he allowed some posts, as if to show others that he wasn't censoring. But he has applied the usual limitations once again. He has also prevented my starting an X account. I tried for weeks to reach any of the other writers I was following or who were following me, but only avatars liked my words. AI avatars are common on X, but I should be able to reach actual people too--a lot of people start X accounts, as we know--but not when Greg's in charge. He is the Censorship Publisher. 


Immovable
July, 2024. I saw a pic of Greg in this shirt, and I agree he’s immovable. To move means to flow and change, to feel remorse, and not only anger. Greg is a rock, but not in the St. Peter sense. He’s stuck in the digital world of the dark webs, with much evil in him, and he won't move on to a better way. For Greg, hacking is a delicious habit like a video game, only more wonderful because the people he hurts are real. 



Blog Comments Disabled
July 2, 2024. If you want to leave a comment on this blog, you won't be able to. Greg has disabled the comment function here. I allow anonymous comments, and it wouldn't do for one of the many people he has abused to raise his or her voice.


Hi! Hi! Hi!
July 5, 2024. I have mentioned that Greg gets manic. He thinks it's funny that he's always got my phone and computer screen on, and he can't wait for me to wake up. People used to be impressed that he was always in his office--until they found out what he does in there. 

In this case, I woke up at two in the morning and looked at my phone, and within thirty seconds I received this text.


He obviously thinks about me all the time. I think about him as little as possible. 

                  


A Christian Leader's Life, 4


Google Alerts
In 2020, my Google Alerts was disabled and has been ever since. For ten years before this, I had received an alert every time there was a new reference to me online. Then I stopped receiving the alerts. I believe Greg intercepts those alerts and decides whether to delete the content online--or hack the person who mentioned me. If the notice is too big to delete or hack--like Poets & Writers--he drags that content down my Google pages. He also fixes this Google reordering now and then, when I complain about it.



WorldCat
In 2020, Greg slipped into WorldCat and dropped half of the libraries that carried my novel Down in the River. The people on my email list witnessed this deletion. He returned most of the libraries to WorldCat later, but he continued to drop some libraries that carried Horses All Over Hell, including Yale Library, University of Georgia, and others. 



Yet Another Threat Against My Son

July 19, 2024. I closed the Blogger editing page for a minute, then returned to make a correction, and the page opened to my post "First Threat Against My Son." I saw that Greg had typed in "First thre" in the search bar. When he's enraged, he generally goes to the most evil place imaginable. Yes, he is always at his desk, and he's almost always hacking. I'm not sure how much time he spends plotting against children, but I'd guess it's about 4.2 %.


[On 9/27 Greg deleted this screenshot. I restored it.]


"Humanization" 
July 19, 2024. Greg placed pictures of himself and his "Catholic family" on his Google banner.

When Greg's down, he employs something called "humanization." It basically means conducting an image campaign to sway doubters. It seems only the most soulless, easily tricked Catholics would be persuaded by this deceit. Greg picks illegal photos from the dark webs and harms kids, but look what a big Catholic family!


On the surface, the man who uses children for his hacking harassment is "Dr. Greg Wolfe." Dr. Porn is more like it. Doctor of Cruelty and Perversion would get us closer to the truth. 



The Fearful Silence of Censorship
August 25, 2024. I was exchanging emails with the editor of Heresy Press, and he will read The Lord's Hacker fairly soon. I hope I can have a small chance there, without interference.

This morning when I opened my phone I found that an off-white “card” had been placed over most of the text of our emails. Last year, Gregory Wolfe sometimes placed such cards on the very Word doc of The Lord's Hacker as I was writing it. He never left it there for more than a minute. He was just using one of his myriad hacking tricks and wanted to send the message that he’s in charge.

This time I believe Greg's covering up my emails with the editor communicates that he’s going to cancel my arrangement with the editor, that he’ll ruin it somehow, as he always does.

Greg’s censorship is tricky in several ways. Not only has Greg sent infected emails to publishers in my name—and will likely do so again—but there’s also the psychology of the publisher to consider. Though most publishers find censorship despicable, they also don’t want to walk into controversy or open themselves up to attack by malevolent actors.

It’s easy to look back at beloved writers who were censored and wonder why they were so alone in their fight, like Isaac Babel and Rousseau.

It’s only later, usually after the censored author and his enemies are dead, that supporters seek to publish their censored work. I don’t place myself in that company of luminaries—nor do I see most rejections as censorship—but I do expect fearful silence and cold shoulders from any publisher who learns of the hacking. That’s what Gregory Wolfe wants too. He loves to see his terror result in destroyed relationships and neglected books. He’d burn them if he could. Being a publisher must offer psychological cover for this passion he has for censorship.

I made the mistake of showing the editor my Gregory Wolfe files a few months earlier. He seemed spooked by it. [Greg deleted this paragraph. I restored it.]

All Greg has left is the ability to frighten people. When Orwell imagined the future as a boot stomping on a human face, he surely conjured tyrants like Gregory Wolfe. I hope there are some, like the fighters in the French Resistance, who are willing to take some risks against a true enemy of humankind.



Gregory Wolfe Continues to Use Death Images to Harass Me and My Family
September 20, 2024. Greg has communicated his death wish for me a thousand times--and threats against my son. One of his favorite places to do this is on my Facebook friends list. Here is a pic of a tiger pursuing Winnie the Pooh--an attempt to keep it light--and next to it is a body lying on its face in cruciform, possibly a child's body, if you look at the ankles. It's probably not a dead body, but it suggests the appearance of one, and that's what matters to Greg. Take a look at the comments on the second photo. "Nailed it!" It might be AI-generated.

I have never seen these "friends" before. I believe Gregory Wolfe has swapped my actual friends for these friends. 



[Greg has edited the above narrative, removing any mention of a child. I restored it.]

My screen shot seems to have been darkened and blurred, when compared to the profile pic (I had blocked this profile, so I looked it up on my ex's computer). Greg often blurs posts I include on my blog, possibly to make them harder to see, so that I have to repost.


As I have mentioned in earlier sections of this post, he hacks into my Facebook app, not into the Facebook website. Please view another Facebook hacking incident in which he placed the FB profile of my friend (who had committed suicide a year earlier) in three different positions in my Facebook friends profile lineup, as a threat to me and a meaningful invitation. He also likes to show me what he's doing, even while trying to hide.



More and More Censorship
September 5, 2024. The censorship keeps coming. When I Googled myself the other day, I found the "Throwback" review of Horses All Over Hell in a Canadian journal by accident. The review didn't tell the author it had appeared, and they didn't tell me. The review was at the top of my first Google pages, because that's how the internet works when a lot of people are reading something. Then when I posted it on my blog and on Facebook and Greg got wind of it, he dropped the review to my second Google page, because that's what he does.



An Assault Against Art and the Life of the Mind
August 20, 2024. For many years, Gregory Wolfe has made alterations of spelling and grammar in my stories and books before I send them out. I've mentioned some of the ways he does this. He often makes a line ungrammatical or confusing to undermine trust in a reader. He might believe it's a gentler method of censorship. Instead of hacking an editor (which he has also done many times), now he simply allows the editor to see the awkward line and leave the manuscript. 

I have documented his various intrusions over years, and while I expect mostly rejections from editors, I'd prefer to get rejected on my own steam. Greg's interference indeed amounts to censorship, and it is an assault against art and the life of the mind. It's impossible for him to utter his remarks about creativity and culture with any credibility while working as a censor. 

Before I was about to submit this story yesterday, I found this awkward line. I had edited the story many times and I knew all the lines. This was certainly not my edit.


The death of snail mail is unfortunate. All book and story submissions are online now. That means Greg can alter my digital submissions and ensure a rejection before editors even finish reading my manuscripts. It's a miracle that some of my writing and reviews of my books get accepted now and then.



Deleting More Libraries on WorldCat
August 10, 2024. Greg deleted the LA Times Library notice on my WorldCat for Horses All Over Hell. It appears that he has deleted this library on the actual site. He has spent years deleting libraries that carry my books on WorldCat. I discuss this elsewhere.  

A sexual harasser, a violator of childhood innocence, he is also a champion of censorship--a very strange activity for an American publisher. It seems there is a connection between these activities. After all, an abuser seeks to cover up his crimes and punish all who have told. These two motivations serve as rocket fuel for Greg's marathon stretches at his desk every day. 




                    A Christian Leader's Life, 5

                               Greg's "Edits"
March 9, 2025. Greg copied a draft of my entry about his disabling my computer and posted it into an earlier entry to make this post seem frivolous and unedited. He has done this often in this post and elsewhere, another pattern.

I mention below that he copied a comment of mine--"Some people seem like they were hacked, but weren't"--and pasted it right below my discussion of the Image women, to undermine the seriousness of the abuse they received. His "editing" creates a pattern throughout. In everything Greg touches, he's a liar, a dissembler. He's certainly not a publisher or writer who believes in Christian Humanism, truth, or the freedom of expression.

Greg's hacking has left all of us exhausted, especially him. If you saw the photo of him at NY Encounter last month--they let him sell his books but he wasn't a speaker--he looked like he was fetched out of a stormy bay and wheeled to NY Encounter on a gurney. He has aged ten years in six months. This might be a good time for him to give up hacking.

Wipf & Stock Hacked Again
March 3, 2025. Here are photos of my most recent book at Wipf & Stock and the "Related Titles" page. The related titles page shows books that are not at all related to my book. For years, until a week ago, the related titles page has shown Down in the River, my first published book at Wipf & Stock, when Gregory Wolfe was the editor of the imprint Slant Books. 

I believe this is a Gregory Wolfe hack. Ever since he and Wipf & Stock parted ways, he has hacked the publisher in large and small ways. I have discussed his hacks at Wipf & Stock elsewhere in this larger post, including a nasty targeting of the CEO. 

Wipf & Stock has copies of Down in the River they'd like to sell, but Greg wants to erase it from memory.

I requested to leave Greg's W & S imprint, Slant, in 2020, and two years later he turned me loose, making it look like it was his idea. Greg told my publisher that he had "canceled" the title. Everything is always a deception with Greg, a sneakiness of appearances. 





[Note]. Greg added more books to my related titles on 3/5/25. He is fond of presenting the jungle cat image, as if to show that he's a vicious animal that will have his prey--he presents this image often, including on the FB profile beside the one that uses the child death image above. 

The jungle cat is a 1970s concept, man as sexy predator and super-stud, in control of everyone, grabbing pussies and knocking guys around (he bullies people digitally and anonymously, when possible). He tries to engage in all of these behaviors out of view of the public, of course, but he gets caught now and then, such as his sexual manipulation of the Image women when he got fired, beginning his spiral as a Christian leader due to his own actions. 

Don't underestimate his rage. He can go ballistic over a disagreement. But I have exposed his behaviors to thousands of people. Naturally, he's especially furious, and he's unwell. His willingness to threaten my small son in this fight demonstrates this. In addition, he communicates with oblique images, whether it's the promise of death, murder, hospitalization, what have you. He's not one to come out and say such things directly. This document shows repeated behaviors and many patterns.





                         Greg's Christian Purity
March 16, 2025. Back in 2017, Greg objected to the Image women's inclusion of a photo of a woman breastfeeding. This photo was kicked down the Google pages. Though it was a controversial issue, the image wasn't available on Google. He is able to delete or drop anything on Google. After the publication of this picture in Image, it was hard to find, and it's hard to find even now. 

This piece of censorship happened shortly after Gregory Wolfe was fired. I suspected the image would violate Greg's Catholic purity, this man who sends child porn and dick pics--what a joke. There is nothing pure or Catholic about this nasty porn man. But what is more sympathetic and good than presenting a woman breastfeeding in such an understated manner as this?


Greg is like so many good Christians of the Georgia Baptist community who in recent years have molested children and demanded to remain "Christian leaders." There is a sickness in these people, and it's time to call them out on their bullshit Christian purity. Never should a Christian abuser, who targets children, ever be allowed to tell others what is right or wrong.

              

Disables Computer
February 25, 2025. Greg has interfered with my ability to watch movies for many years. He has caused my various computers to hiss wildly or else paused movies or turned them off. My ex-wife saw all of this taking place. It was unsettling and difficult. Maybe this isn't a crime for the FBI, but it is harassment. 

This time, he fixed an orange light to shine constantly on this computer. I used this computer only to watch movies. The light shines even when the computer is off. At the same time, he completely disabled my ability to watch DVDs on this computer. In the past, he has only shut down individual movies. 

Many of my posts, by themselves, could have a technical explanation, but hundreds of such issues, occurring regularly over many years, suggest a hacker. Likewise, a computer can hiss, it's true, but not over years and years, not multiple computers hissing each time you buy a new one. It's repetitions and patterns that reveal there is something more than a tech issue.

Once again, everything seems like a hack to those who are frequently hacked. But for those who are not hacked, they know that each and every day is not teeming with malfunction and irregularity.


                              

                     Wolfe Gets His Revenge
February 27, 2025. I have known all along that there was a price to pay for showing what Gregory Wolfe does. Especially now that so many people have passed around this post--recent stats show that thousands of visitors have read these pages--Wolfe is angry, and he is pursuing his revenge. Then again, he has always done that on some level.

For those of you who have read this entire post, you have seen that his attacks are personal and professional. He has targeted me, my son, and many of my editors and publishers and colleagues. His methods are often extreme. He placed a fake voicemail on the phones at Eugene Weekly, because the editor Camille said she wanted to investigate Wolfe, as I have shown. This is an outrageous claim, at first glance. But I believe my documentation of it in an earlier post is sensible and convincing. At least one person in the office also confirmed that the voicemail wasn't theirs.

The Eugene Police Department saw criminal activities in this post, but lacked the tech to pursue it, so they referred the case to the FBI. I believe the FBI has a cultural mistrust of hacking cases, but also lacks the tech (in the northwest) to pursue a high-level hacker. 

Here are a few recent hacks.

On 2/20 intake specialist Mikala at EPD told me she wouldn't refer any more crimes from me, though Supervisor Anderson had told me I could bring new complaints regarding this case. She wouldn't tell me why. Did the department change its mind about sympathy to hacking cases? Was Greg involved somehow? 

[Note 4/1/25. After I filed an audit in late February, a new EPD manager told me that Mikala was mistaken in saying I couldn't file any more hacking cases.]


On 2/25 I called EPD again, but their phones were down. When I called later, a different intake person said they were having problems with their phones. He said that was unusual. Even 911 calls weren't coming through, he told me. When I told him I wanted to ask why Mikala said I couldn't bring new cases, he said I'd have to register a complaint with the outside auditing service. It's possible that other authorities in EPD are weighing in on this hacking case, but I can't be sure.

But when I called the auditor's office now, the call didn't go through. So I walked to their nearby office. The intake person said she didn't know they were having phone trouble, but her call didn't go through when she tried it.

I want to be careful to say I don't know what's going on with so much phone trouble in two different offices. (The auditor's office is not part of EPD.) It could absolutely be a coincidence that their phones have gone broken. 

But since I know that Wolfe created a fake voicemail for Eugene Weekly, I want to be open to the extraordinary possibility that Wolfe hacked EPD's phones. 

After all, it was EPD that referred this case to the FBI, giving a lot of credibility to my claims, and I was able to reveal Wolfe's behaviors to about ten thousand people so far, with the help of others on my email list, who sent my posts to their colleagues and spread the news. If Greg has a motive to kill an investigation at the local weekly, he also has a motive to obviate any more action at EPD that would favor my assertions about Gregory Wolfe. 

Also, this person has no respect for law enforcement. He feels he can evade almost anyone who might chase him, and he might be right. Therefore, owning some person--or an entire business--amounts to a fun game for him. This malignant narcissist doesn't see people as people, but only as sport for his games of control and domination. 

My experience tells me that when several glitches happen at once, they are not glitches at all. That said, I can only speculate on what's going on. Greg might be restricting his hacking to me, or he might be hacking others, finally deciding to shut down this exploration into his behaviors. And we probably won't know for many years exactly what happened.                                   
              


                             More Dead Kids
February 7, 2025. I Googled Anne Lamott, but I hadn’t read her for twenty years, so I couldn’t recall her name. Her quote that yelling at her son made her feel like she was bitch slapping ET is a famous and funny one. But I got a bunch of stuff on the search results that looks like presents from Greg. Most of it is Greg’s favorite theme: dead kids. He’s certainly going to want revenge at this time. (The one entry about "my adult son" doesn't clear Greg of his repeated attack on me and my family).

The Google search did find the quote and the author. You may have noticed, when you search this and that, Google doesn't throw in other random results about dead kids and suicide. But Greg certainly does. 

Some of the screenshots didn't stick, so I returned to the search and screenshotted those too.










                          Greg's Warnings 
February 19, 2025. Yesterday I sent an email to my son's principal regarding the school's punitive rules against yo-yos. But the email didn't make it to the principal. Yo-yos aren't high level items, but it's my inability to email the principal that is important. 

My email was a response to the principal, and neither he nor anyone else he had CC'd--including my ex-wife--received my email. Greg not only targets children with death images etc., but he removes emails from a parent to his son's principal. 

Why does Greg do this? He's a harassment hacker, so he deletes emails and submissions, etc., to irritated and establish control.
                                                          
                      

                   Greg Blurs More Images
February 6, 2025. I posted this fake ICloud banner in December, but Greg has since blurred the words and images. He often blurs or grays photos because he doesn't want them to be inspected. 


Google alerts are part of this story. As I mentioned before, I no longer receive them. Greg wants to see my alerts so he can delete most of what he finds there. But for a week in December, I received many Google alerts for another Ryan Blacketter, whose child recently died--represented by the candle. Greg is willing to feed that Google alert in my direction, very meaningfully.

This ICloud banner on my page was created to show pics of this candle, strange hacking messages, my son, etc. But these pictures are out of order and seem chosen by a person--Gregory Wolfe, I believe. Why would ICloud choose these to make such a random banner on its own? It simply wouldn't.

Here is one of the blurred pics--part of the shrine to Greg's hacking.


Greg can get very oblique in his messages, but I believe he wanted to communicate that my son is tied up in the scary world of hacking. This isn't the first time I've seen messages like the banner--oblique, meaningfully scary--so I know how Greg thinks. He also tends to blur his death images, just as he blurred the image of the dead child image featured above, of the kid in the black coat. That's one of his many patterns we can observe. 
                  


                Deletes Screenshot and Narrative
February 1, 2025. I feature this fake blogger count again because Greg has deleted it from record. This morning I found that he also deleted my discussion of it. The high numbers of the monthly counts and the low numbers of the daily counts don't add up. Greg knows this shows his manipulations, so he censors it. I attempted to restore the post "Deleted" below.

If you can't see this screenshot, you'll know Greg deleted it again.





                     Kills Everyday Emails
January 31, 2025. Greg continues a ten year campaign to isolate me. It sounds like a sinister plot, and it certainly is. He has prevented my simple ability to send emails to friends and associates. Often people with whom I have exchanged emails for years don't write back. When I call or try to email again, they say they didn't receive the message or else find it in spam. I have mentioned that he kills my emails on a professional level too. Most of my emails seem to end up in spam. This can happen now and then, but now it's happening almost all the time, and the frequency is suspicious. Since other emails are simply deleted, I suspect Greg's hand at work in the whole mess.

The message below is from the chair of an English department in Prague, a former professor and writing colleague. When he didn't write back, I tried to get in touch a couple of times after that, and one email got through. He wrote back yesterday.


                                                                         

                    Don't Mess with the USPS
January 23, 2025. I had trouble filling out a change of address request online at USPS, on January 9. Each time I filled it out, a red line said "Your attempt was not successful. Try again." So, I tried a few times. When nothing went through, I attempted to use my ex-wife's as a mailing address--she approved it--and those also were "not successful." 

At the post office yesterday, the manager said that all of my attempts had gone through, and my account was shut down due to a fraud alert. He said the "not successful" notices I had received sounded unusual. I told him the addresses I attempted to use. He could see those, but he said I had to cancel these forwarding attempts online or call the USPS number. He said I'd be able to sign into their system. I tried at home. The online system isn't available to me anymore. USPS is looking into the matter. Some guys in blue jackets are on it.

Greg seems to consult the Dark Webs manual on how to screw somebody. Last year, when my credit rating dropped 125 points in one day, my bank looked into it and saw no reason for the drop. In two or three months, my score popped up again, also for no apparent reason.
                        


                          Kills Connections
January 9, 2025. Greg kills connections and friendships. He hammered my close friend Adam Farley, who owns a tree nursery business and was a former student, with spam or worse in 2022, so Adam had no choice but to stop talking to me. And there have been other such moments I haven't written about.

Once, in 2019 I was on a bus from Cincinnati to Harrisburg to see my ex and our son, when I received a glowing message from a guy who loved Down in the River and who had made an appearance in my book. The trouble was, the Messenger note had been written in 2014! It took five years to land in my inbox.

Another time, in 2022, a Facebook friend was singing my praises with my second book, taking photos of himself holding the book as he traveled Europe, and we were getting close. We'd been writing each other for a couple years. Then one day, without any tension between us, he went silent. I believe Greg thought he might write about the book, and so he intervened with one of his electronic assaults. 
                        


                         Count Manipulation
January 17, 2025. The previous version of this post, "A Christian Leader's Life in Censorship and Porn-Hacking," he recorded at about 400 visits. But the other day I discovered those numbers were changed to about 1400. Maybe he was afraid someone could see the disparity between his count and the actual count, and so he changed it. See the numbers in the fifth visible entry below.


                      


                 Suspicious Silence at Amazon
January 11, 2024. Yesterday my publisher told me that she emailed a ticket to Amazon Central to fix my Amazon page and got back to them three times, but no one got back to her, over two weeks. Amazon Central is very good about getting back to writers--and even better at getting back to publishers. My publisher believed this was unusual, too. 

Since I know Greg views and deletes my emails--and gets into my associates' emails and deletes those too sometimes--I suspect Greg killed my publisher's emails to Amazon. After all, he has a strong motive to limit the publication of a book that exposes him. I believe he removed my Amazon page for this reason, and it's certain he will employ his hacking skills to harm the reach of The Lord's Hacker. He has earned my title for him--the censorship publisher. 
                            


           Continues Email-Deletion Campaign
January 8, 2025. More thoughts about Eugene Weekly. On Monday I placed an ad for my tutoring classes. The advertising contact said she'd email me the invoice, and when it didn't arrive, I wondered if Greg had deleted yet another email. The next day I called, and there was a generic voicemail that said, "Mailbox full. You can't leave a message." 

In an earlier post, I mentioned that Greg sets up fake voicemail boxes when he doesn't want me to call a certain place, and that he did so when the Eugene Weekly editor wanted to write a piece on Greg but went silent, without comment. Again, he can get quite elaborate in his high-tech hacking, playing CIA agent for small-town concerns.

I went into the Eugene Weekly office yesterday and talked to the woman who had said she'd email my invoice. She printed out the email that she'd sent but that never arrived in my inbox. I asked her to call the weekly, the office we stood in, and she called it on her cell. "That's odd," she said. "The phone isn't ringing. And that's not our voicemail."

The fake voicemail appeared to be set up for anyone who called, not just me. But Greg is a fan of change-ups. 

I believe Greg hacked the editor last year as a warning to stay away from me. Now that I placed an ad there, he deleted the email to show that he's marked the place, like some baboon who's in charge of a certain grove. 

Hacking is such a genius crime for the harasser. It scares the hell out of people, so they don't want to talk. The editor at the weekly is a cool lady who is trying to recover from an act of embezzlement that almost tanked the newspaper last year. Greg tends to hack people he knows are weak, knowing they won't talk, because hacked people--besides me and a few others, in this case--do not want to talk about it. 

This story probably sounds crazy to those who are new to Greg's behavior. But the sudden silence of the editor who'd said she wanted to investigate Greg is telling. Also telling is her refusal to acknowledge it when I told her EPD had forwarded the case to the FBI. It also shows something that these fake voicemails have popped up again and that the advertising contact observed this, and that one more email has been deleted. If it sounds crazy, it's because Greg is crazy, and unfortunately he's also very smart. 



Greg Feels Hated
January 4, 2025. The rumor is that Greg feels sad and "hated" right now. Self-sorriness is a common feeling for criminals with narcissistic personality disorder. What he should feel is deep remorse--instead, he feels sorry for himself. He feels like a victim. People aren't seeing his accomplishments and so on.

Let's recall a few of his behaviors that top his "worst of" list: He targeted me with my own photos of my son at various ages, while also spoofing random child death images to me--amounting to a terrifying threat. He changed my name and address on my first police report about his behavior to the Eugene Police Department. He spoofed child porn under cover of adult material. He took my two posts about him offline (including this one). He disabled comments on my entire blog. He disabled Google analytics by removing the dropdown on "Stats." He cut more than three hundred of my followers the day my first post about him went live. Several times he rewrote this larger post to make it seem frivolous and unedited. He deleted one entry about my son, and altered evidence on another. He downloaded a death image into my son's computer. He sent dick pics to my Latina date. He sent women infected emails and banners in my name. He hacked my colleagues who had supported me or written about my work. He frequently rewrites The Lord's Hacker. He hacked and harassed me when I was writing that book. He hacked the editor of Eugene Weekly after she said I was "on the list" for an investigation about him. He removed from Google almost all of the blog posts on my broader site, to diminish my presence. He removed my Amazon Author page. He hacked Hobart after the editor invited my submission. He wallpapered my Google pages for three days with porn descriptions, each one including my name and words like cunt and cum and cock. He pretended to be my son on Digital Touch. Three times he placed the profile of a friend who had committed suicide years earlier, onto my Facebook Friends profile list. He hacked an elderly professor because he thought he was helping me. He deleted many of my email submissions to publishers and editors. He deleted my email to the Commission on Judicial Fitness because it partly concerned him. He tracks my logins on Google so that he can locate me on public computers. Greg placed his own photo on my blog as warning, the day he first took this post offline--a warning to me and others. And I believe a careful read of my complete post, and its discussions of motives, leads to Gregory Wolfe.

When an active criminal has no ability to feel remorse or try to change--especially when a child is involved--feeling sorry for him only goes so far. But I'd forgive him if he stopped doing these things and apologized.


The Censorship Publisher
January 6, 2025. I got an email from a publisher this morning telling me that an old manuscript I submitted to her three years ago had been rejected without their knowledge, due to a "possible bug." I think that bug was named Gregory Wolfe. If someone threw a rock at your house once, it's normal life--an accident. If a rock is thrown at your house ten times a week for many years, you ought to be concerned. The rock thrower has targeted you.

In other news, minutes ago I submitted a novel to a Portland publisher and received a "success" note. But at the same instant I received a "success" note from the British vanity press Pegasus that I didn't submit to. This is how Greg spends his time, uploading a fake manuscript to Pegasus in my name, and submitting it simultaneously with my submission to the Portland publisher. We all know that people go a little batty when they're at the end of their rope. 

Who knows what his message was: either that the Portland publisher is the same quality as Pegasus, or that Pegasus is the only publisher I have a chance at, with a perverted censor canceling my submissions.  



        Greg Deletes Email to Judicial Fitness 
January 3, 2025. I emailed Rachel a complaint at the Commission on Judicial Fitness in Salem, about the judge who bungled my restraining order request. When I called to confirm receipt of the email, I wasn't surprised when she told me she didn't receive it--yet another email deleted. The restraining order I had applied for mentioned Gregory Wolfe, and he wouldn't like any investigation that concerned him. 

Later I was able to upload my complaint at Judicial Fitness onto the site, and Rachel confirmed it. But I will check with her later to see that it remains on their site.

I mentioned that the judge didn't have my complete evidence. It's possible that Greg altered my evidence file before I printed it, and that I only believed I was submitting the complete file at the court intake window. I can't know for sure.

Whatever happened, Greg is committing crimes at a high level, just as he did when he blocked my first police report at the Eugene Police in January 2024. That's why, later, in the summer, I carried my paper evidence file to the police station where Officer Anderson examined it and sent it to the FBI.

Every item in a digital file is like a ripe dandelion, ready for a hacker to pluck and blow it across a summer field.



Restraining Order News
December 30, 2024. I tried to get a restraining order for my son today, since I don't think the FBI will do anything, and if they do, it will take a while. But this judge believed my mention of the Eugene Police Department and the FBI were part of a tall story, conjured by someone who believes in hackers. Also, the evidence I presented was incomplete on the judge's end. The death image of the child facedown in the field must have been plucked from the court's computer system. He said he didn't have it, and seemed to suggest it was part of a deception on my part.

He told me this was the fourth restraining order I had requested in three years, and said he believed it suggested an "obsession." Well, yeah, but not how he thinks. He said, "This has nothing to do with Gregory Wolfe."

The police referral to the FBI is verifiable. Apparently this judge was unable to pick up the phone and call the police supervisor I had mentioned by name.

It was surreal. A suspicious, scornful, and unreasonable judge . . . Lost evidence . . . Maybe it was just a normal day in a small-town court.

It's true judges have clear statutes to determine restraining orders, but it's worse when mind-reading is part of the process. So far only one judge--Charles Carlson--has been open to anything related to hacking. Otherwise, there has been open ridicule for the existence of a crime whose destruction grows nationally day by day. They simply don't have the resources or tech capacity to acknowledge it. It wouldn't do to admit they are helpless in this area. Thus they regard those who bring hacking cases as the real hackers. We wear it in our clothes and in our sullen faces. 

It's likely only five to eight percent of judges and law enforcement are even open to the subject. 

That's why I have kept going back to the police and judges. It's a numbers game, finding your way into that five to eight percent, and I've had some good results too. But a negative result is fruitful to illustrate the culture we are up against at this time.



Greg's Eternal Edits
December 30, 2024. Greg cut a line in this document that says “Some people act like they were hacked, but weren’t,” and placed it right after my discussion of the situation at Image below, in my December 27 entry. We know he likes to make his misleading edits. Also, this move suggests that he might be hacking the women over there. Whenever Greg communicates something in this indirect manner, almost always he's denying reality.


Of course he's hacking them. He hacks many people for no good reason, and these women, justly, took away his one big achievement. I've seen evidence of his hacking there, eviscerations of certain Image content and photos, from popular issues--thrown down the long stairs of Google ranking. He's got his hands all over it. That's his way.

Greg censors in large and small ways. When he's not messing with Blogger, the spellcheck works fine. But check out my pic of "restrainin orders"--no red line today.





         Greg Uses Women in Revenge Game
December 27, 2024. Gregory Wolfe specializes in wrecking friendships, especially when beautiful women are involved. To this Serbian woman, an editor who is a friend of mine, he sent infected-looking emails to turn her away from me, after she asked if I had a short story to send to her. It started a fight between me and her. Elsewhere in this post I include the screenshots of her statement that she was receiving infected-looking banners that Greg often sends. I intend this entry as an expansion of similar entries, with a slightly different focus.  


I've also mentioned that he removed pictures of my then-wife from Facebook in 2015, hacked my friend Mary Owen, the daughter of Donna Reed in 2022, and in 2023 sent dick pics to my date.

For many years, while at Image, Greg hired very cute young interns. I've mentioned that he filmed them in a mock video called "The Interns," showing cleavage and flashes of panties. He tried to get at least one of them to go to bed, she said no, and he got fired by his all-women staff, for his sexual harassment, gas-lighting, brutal psychological manipulation, and panic-inducing control games and bullying. He gets off on having cute girls around, to make himself look good, and he fights men based on the attractive women they know.

Greg is a Russian-style porn hacker. He likes to play the strong man in this way.



         Greg Cut This Photo and Its Blog Post
December 26, 2024. Greg has edited this entire, sprawling blog post many times, now and then cutting entries and photos. Today I looked for the entry that shows the Word note "Someone has made changes since you last opened this document"--a note that Word generated in much older versions, if a person opened the document in various computers. But I only edited my document on one computer, and I have a new version of Word. Since Greg actually rewrites passages of The Lord's Hacker--and frequently changes grammar and word choice--I believe he wanted to show me this note as a taunt.

At any rate, I couldn't find that post in this lengthy blog post today--because Greg had cut it. And he cut it because it plainly shows his interference. It also shows his high-tech ability to get into any program. As I mention elsewhere, he also placed fake login screens on Word, as if I had to sign in there to work on my manuscript. Logins to Word! There were other similar distractions, including a white "card" that he placed over the page on which I was trying to write. It only showed the text on the far right side. These cards and the login screens usually vanished in a minute, as if their purpose was to make me angry so that I couldn't write. 

Fortunately I found the pic of the Word message saved in screenshots just now. Who knows what else he has recently deleted. I try to keep up with it, but there's a lot of material.

Greg started placing this note on Word when I was writing The Lord's Hacker and when he was "editing" it, earlier this year.


The last time I saw the above notice was about two weeks ago, when I was doing my third final proof of The Lord's Hacker before it goes to my editor. Greg has edited this line (below) three other times, for some reason. My original line reads, "with four or five shiny leaves on it." I keep changing it back. The censorship publisher is hard to keep up with. He has made a lot of stupid, nothing changes like this, just to be an ass.




Interaction with Eugene Weekly Editor
December 26, 2024. I ran into Camille, the editor of Eugene Weekly the other day, out front of the magazine's office--the one who agreed to do an article about my hacking but went silent. She was about to go into the office when I was stopping by to tell her the news about the police referral to the FBI. She seemed quite spooked. She put on a mask and didn't want to make eye contact. When I asked if she'd been hacked, she said, "Nope." 

After I told her the news, she said nothing. I said, "Well, it seems like a momentous development, right?"

"Thanks for stopping by," was all she said about it. "Thanks for stopping by."

You never know for sure what's going on with someone, but I have learned that the hacked do not like to talk about being hacked.



                     Controls Email Accounts
December 25, 2024. It is with a light heart that I announce former Christian leader Gregory Wolfe is hacking me on Christmas morning! I'm unable to create a new Gmail or Proton account. He all but disabled my icloud and combined it with my Gmail, so incoming emails end up in one or the other accounts. Also, my emails from Varsity Tutors goes either to icloud spam or Gmail spam, so I have to search both accounts often, in spam or trash, to see if anyone wrote me about a new client. Clicking "this email is not spam" doesn't help. It's a huge mess.


In the past, Greg has simply prevented my contact with many employers, canceling email communication, deleting applications, etc. This time I believe he wanted to allow me to work here--to show that I am getting employment--but he decided to hamper my ability to get assignments as they come in. Therefore he achieves the same result, but maintains appearances. I didn't see this job that had landed in my spam for hours. But Greg has always been sneaky like this, and like I have said, he devotes an ungodly amount of time to hacking me. My screens are always open on some computer in his office. 

Merry Christmas, Greg! I hope you're leaving some room for Jesus, the Holy Ghost, and a more cheerful Santa.




This Post Is Not Online
December 23, 2024. This new post, "Eugene Police Department Refers Gregory Wolfe Hacking Case to FBI," is not online. It was posted December 14. I had cut and pasted the previous post, "A Christian Leader's Life in Censorship and Porn Hacking," into this new post and gave it a new title to see if the new one would also fail to go online. (I took the previous post down after I transferred it to this post. It had been up for six months or longer).

Neither one went online. That's because Gregory Wolfe took them offline. Who else would have the motivation? I don't believe it's possible that both posts about Gregory Wolfe would simply happen to go offline. There are many other examples in these pages of Gregory Wolfe protecting himself by manipulating online content.




Double Life
December 23, 2024. In Greg's hacking, he also lives a double life. He usually tries to make things look a bit off, so that I’ll know he’s doing it. He wants to stay hidden, but since he’s a harasser, he has to be seen too. If I think his hacking is normal computer behavior, then I won’t get so frustrated. Therefore he finds a careful way to show his hand.

(This hacking event took place December 20th, along with other hacks that I describe in the previous post.)

Look at this message below. I was trying to change my password, but I was already logged in with the same username I had used with this company where I was recently hired. So this message makes no sense. (I was changing my password, not logging in. The message is therefore senseless. I was caught in this loop for a half hour).




InvestigateWest
December 12, 2024. I attempted to contact InvestigateWest about a possible investigation of Gregory Wolfe. I found the same interference as when I was in touch with the Eugene Weekly editor Camille, who said I was "on the list" for an investigation but then stopped communicating.

When I first saw the InvestigateWest site, today at about 1 pm, there was a photo of two journalists front and center, two women on a couch, one wearing a backwards baseball hat. Within two hours of my first email contact, that photo was removed. This might be a coincidence or it might not be. But it's possible that Greg hacked them immediately to send out an early salvo in warning. He endured one investigative article about him in 2017--about getting fired for sexual harassment--and he doesn't want another.

When I called the InvestigateWest number, I found a robot voice telling me to leave a message. Later I took my phone off wifi and called back. This time I got the voicemail of someone who actually works there. My phone log shows I called the same number both times. Again, the exact thing happened at Eugene Weekly when I tried to call them last year, first the robot voice asking me to leave a message, then (after I cut wifi and called back) a real voicemail from someone who worked there. 

Greg is able to set up a fake voicemail when I call a certain number. But this hack only works when my wifi is on.

The Seattle-based InvestigateWest number shows as Spokane on my phone log. Both calls are shown here.


Here is their website:

                          



     A Disturbed, Immoral "Christian Leader"
November 19, 2024. For days Gregory Wolfe has been sending me more photos of my son, as a baby, as a toddler, and more recent pictures--even though I turned off Messenger a few months ago, when he was sending pictures of my son then too. 

Last week, he sent a "memories" pic, with my son in view, but he disabled screenshots of it. Next day, he sent a memories bar, without my son in view, maybe so that it was impervious to screenshots that would reveal something. When I clicked the bar, it went to a pic of my son in diapers. There is clearly no uniformity in the memory shots he's sending. And there are no records of these dark gifts in "memories" or Messenger.

Greg wants to communicate that something bad is going to happen to my son. He sends me death images of children for the same reason.

The other day I sent a new picture of my son to the Christian scholars. He's ten, wears a hat over his long hair, and has a natural, happy smile. Even the most hardened prisoners know that children are sacred. But Greg, a "Christian," doesn't know that. 



                       A Sneak and a Fraud 
October 17, 2024. Gregory Wolfe has committed fraud against thousands of innocent people in his various Christian enterprises. He has sold his Christian humanist idea to coax artists to his Glen retreat, all the while studying his dark webs tools to harass, bully, censor, and destroy anyone who challenged him. Let’s not forget that the author of a book on teaching morals to children harasses with adult porn, child porn, and sexually harasses young women. He made a lot of money as an outright Christian fraud. 
 
After I posted this fraud post, I discovered that my blog was empty. I saw that it was still there later. I mentioned that he uses two screens a lot.


                    




Organizational Thinkers
February 25, 2025. I have mentioned that, while the FBI does good work in traditional cases, these intelligent agents are next to useless in most hacking cases. This is because the FBI is uncommonly organizational, and the organization has decided not to believe 99% of hacking cases. 

They do everything by the manual, and that's not always the best way. The FBI even has a specific technique of taking phone calls. They pepper the caller with snarky questions and comments. "What's this guy's motivation?" or "I can guarantee he doesn't have any interest in your Facebook page." Then he or she begins the rapid closure of the phone call, talking in the dazzling speed of an auctioneer: "Thank you for calling the FBI. This call will be documented and you free to follow up with a complaint." And they hang up on you. All intake people do this exactly the same way.

I know that they are looking for words like "I'm going to kill you," etc. and that they are trained to dismiss anything about social media or anything else that seems frivolous. But my hacker, in fact, uses social media and my Google page as a template in which to present child death images, underage porn, a photo of my friend who committed suicide, etc. It's true the FBI is looking for extortion and bodily harm, but my harassment case is horrifying and dangerous, not frivolous, not imagined, not paranoid, and deserves an investigation. In this case, it's time to think outside of the organization. 

Judges also tend to dismiss almost all hacking claims. I've stood before a few judges who were visibly angry that I even brought a hacking case. Even while newspapers and attorneys say that Russian-style hacking is increasingly common in America, judges and law enforcement respond to this reality by refusing to believe it even exists. 

Since this response makes no logical sense, I believe this shutting of the eyes is a psychological reaction. After all, law enforcement has not kept apace with the high-tech criminal hackers. To open up the courts to hacking cases would be like opening a portal to a howling infinite that would cause headaches for judges and law enforcement. Not even the FBI has a lot of tech in the Northwest.

And this is why judges and law enforcement regard with anger and distaste the person who brings forward a hacking case. They can't do anything about most hacking crimes. They don't have the tech. Psychologically they have hardened themselves against you, knowing that your possibly reasonable case can't even be considered. You almost become a criminal in their eyes.

I've been lucky to meet one police officer, one lawyer, and one judge who are indeed able to think independently about this issue, and now I hope to meet one FBI agent. I'm not holding my breath, though.