






HELP WANTED IV: America’s senior citizens and disable veterans are being attacked over digital programs
AGN.News Team
August 14, 2025
PHOENIX (AGN.News) – OPINION: Seniors and disable veterans are the new targets of tech-trained hackers. Everyday these Americans are looking for ways to navigate the tech world while tech-trained hackers are looking to exploit their vulnerabilities.
Many of them are facing challenges related to mobile devices, computers, email and many other tech-related issues while their tech-trained neighbors are burglarizing their homes and stealing their assets and the data from their digital devices.
New senior-focused crime wave
In the previous three posts we revealed the ongoing struggle ‘Jon’ – a senior citizen living in Phoenix – was experiencing with a group of tech-savvy burglars and thieves. He explained how they broke into his, once-peaceful-home, and stole all of the data from his computer. Then came back and stole the data from another computer. Later they returned to steal the data from his new laptop computer then destroying it on their way out the door.
This became a new wave of criminal behavior directed toward seniors. Over the course of 10 months his home was burglarized 17 times. Each time they came was a new set of crimes. He explained that there was a bit of community involvement related to this ‘new crime wave’ that should not be overlooked.
First, the crimes were centered on destruction of property. Two refrigerators were destroyed. Then the hot water heater was destroyed. Next came the plumbing in the bathrooms, and other crimes. It appeared as though their effort was centered on making his home unlivable. But why?
‘Jon’ was repeatedly told by community management he should leave and go “on-the-run” for a year and then come back. ‘Jon’ said, “That was the most ridiculous thing he had ever heard of from a person entrusted with the oversight and management of a HOA-type community.”
Focus should have been on making the community a more secure, safer and peaceful place for seniors rather offering ridiculous commentary directed at one resident. Rather, management could have sought advice and solutions with the assistance of law enforcement rather than victim-blaming a long-time resident.
Community is showing their support
As the word spread of these crimes, members of the local community stepped up to show their support. A group of retired investigators formed a type of secret “Observers” group. Their first tasks was to verify the accuracy of the accusations. ‘Jon’ said he had no idea that they were operating nor any idea who they were.
In May 2023, one masked-wearing person among them told ‘Jon’ who was behind the cyber crimes committed up until then. He told ‘Jon’ where to go online and find the identity of those they believed were responsible.
This initially pointed to a multi-billion dollar tech company who wanted the name of his family’s company. That company had allegedly filed for a federal trademark for that name. However, it was denied because they allegedly did not respond to multiple requests for proof that the other company was theirs.
Whether that person was one of the ‘Observers’ or not is not known. However, the information supplied was absolutely accurate. The tech giant did, in fact, apply for a trademark using their name but it was denied by the USPTO.
Last month they came back and identified local burglars and tech thieves. The “Observers” claim to have video and still shots of the burglars coming and going over a period of time. Their information was very accurate. ‘Jon’ said they told him the exact time and dates of his leaving home and exactly where he went, how long he stayed, and his return home as proof of their surveillance.
Keep in mind, ‘Jon’ still doesn’t know who the “Observers” are nor does he know where they live. He said the “Observers” wanted to verify the accuracy of what he was writing about back in spring and summer of 2023. “People often make up stuff seeking attention”, they said. But after they followed him and reviewed his 2023 reports, they knew he was telling the truth.
Community showing their unity
After finding out Jon’s Samsung Galaxy tablet was stolen along with his ‘notebook’, they began to review past footage of the burglars dating back to the summer of 2024. That review revealed the assaults on Jon’s websites. Reference was made to the exact time and date of many of the assaults and burglaries.
The cyber crime assaults on MsE***n dot com came up in one of their group discussions. In fact, they said the assaults were of a ‘daily nature’. Essentially, the hackers were attacking that website on a daily basis. You can go there right now and see the damage.
Why were they attacking websites?
First, the cyber attacks were part of a master plan. Secondly, the plan was to study the behind-the-scene working of the sites. Since they are very unique, the hackers needed to understand how they worked and then unleash a server-wide attack to bring them all down one by one.
Thirdly, they started to delete the usernames and passwords on the site and replace the logins with members of their hacker group. This would make the actual registered owners obsolete to be replaced by members of the hacker group as owners. At that point, they would repair all of the affected sites and using the newly created logins to access the sites as the new owners of the websites.
What about the home burglaries?
Now, back to the home burglars. The plan was for their accomplices to steal all of the data from the computers in the home office. Then, share all of the stolen data with their entire group of hackers including their leadership team.
The leaders would then create a plan to seize all of the websites and claim ownership of them using forged documents and a fake paid-for-notary who would then validate to accuracy of the documents with a fake ‘notary seal’ and then take over the entire digital assets of the company.
Reasons why they stole the Samsung
In the early morning hours of June 24, 2025 a little after ‘Jon’ left home, the hackers broke into his home and stole his Samsung Galaxy tablet within minutes of his leaving. Their accomplice was nearby serving on as a type of ‘lookout’ then called the actual burglar who hurriedly entered the home and quickly searched for the briefcase and found the Samsung Galaxy tablet and fled the scene and disappeared.
The accomplice, who must have been very close, watched as the police came to the scene and left after they were able to prove a crime had been committed.
On July 7, 2025, the hackers came for the ‘notebook’ ‘Jon’ often carried. This time several police vehicles came to the scene. They searched the house and cleared it of any suspects. However, under questioning ‘Jon’ couldn’t explain exactly how nor who committed the crime.
As ‘Jon’ was talking to them, the next door neighbor backed out of his garage area and fled right by them as they stood in the driveway. One of the officers followed him out of the neighborhood and down the street to the highway and beyond.
That flight resulted in an apparent investigation as to who he was and why he fled. ‘Jon’ said, “No one told him what the police found out or what happened to the ‘notebook’. This was around 6:00 pm on Monday, July 7th.
The return of the ‘notebook
On Wednesday morning July 9th, ‘Jon’ started his day by placing his gear in the car. He went back into his house to turn out the lights and so on. He returned to his car and drove to his first appointment. When he arrived he exited his car, walked around to the rear passenger door, opened it and – low and behold – the ‘notebook’ was back in the exact place where it was when it was stolen. He couldn’t believe it. The thieves brought it back!
The return of Jon’s Samsung Galaxy
As more and more of Jon’s friends, family, and followers referenced the theft of the Samsung Galaxy tablet that his now-deceased mother gave him, the outpouring of support flooded the a lot of personal email accounts of people who knew ‘Jon’ and were his friends for many years. The word quickly spread across the country and the world. Everyone was looking for that Samsung tablet. We estimated it would take about two months to get results but it was only 45 days.
Well, we’re happy to report that the Samsung Galaxy tablet has been recovered. The burglars returned to the scene of the crime, placed the tablet in the home and fled the scene before being discovered. ‘Jon’ said when he saw it he was overjoyed. They brought it back after 45 days on August 8th while he was away from home!
The one thing he immediately noticed was the password had changed. That really was not a problem because the tablet could still be accessed and the old password could be replaced with a new password. However, by the next day the reality of the situation set in.
Why did they return it? Why did it take 45 days? What did they do with it? Did they put something illegal on it? Did they place something on it that he may be blamed for? Can a group who burglarized his home to steal his Samsung tablet and then burglarize his home to return it, be trusted? The answer is also obvious.
Motive for returning the Samsung
This is why ‘Jon’ thinks they returned the tablet: They returned it, not out of remorse or a guilty conscience, but out of a malice of heart and a desire to end the tidal wave of criticism coming their way. They knew by changing the password the device could not be opened normally. The hashtag #JonsSamsung was gaining traction.
Opening it would require completely erasing all of the data on the device replacing it with a new operating system. Everything the hackers had done would be erased. That’s why thieves can never be trusted. But ‘Jon’ has the Samsung given him by his mother and a lasting gift to cherish and that’s what he wanted more than anything.
Taking the Samsung tablet involved three separate felonies. Three serious crimes! Did they just become honest citizens all of a sudden? The answer to that question is obvious. ‘Jon’ said, “I’ll keep the Samsung but I will not unlock it, ever. What’s on it needs careful scrutiny by a police authority before any use.” The reality is ‘Jon’ has to buy a new Samsung Galaxy tablet.
Jon’s Samsung marked the “end”!
Now, Lady Justice has stepped in and accountability is on the horizon and no one can save them, not even their “bosses”. The tip of the iceberg was the theft of the Samsung Galaxy tablet and the notebook.
Those two crimes exposed their true nature. Until then he said he just tried to “carry on” without upsetting the neighborhood chemistry. But burglarizing his home and committing outright grand theft in broad daylight crossed all red lines.
The thieves just didn’t know when to stop, so outsiders came to the rescue and more investigators are coming. After 14 years the end of this terror is near!
Now, national media is asking about this case. It’s going to go viral, all because of the stolen Samsung Galaxy tablet.
After thousands and thousands of dollars in damages online and offline the responsible parties needs to be aware of their responsibility to compensate ‘Jon’ and the other victims for damages done. In reality, they need to pay for their recklessness.
This case needs a federal investigation!
Additionally, now, ‘Jon’ is calling for a federal investigation of both the thefts of the Samsung and the accompanying cyber crimes that they are allegedly involved in. ‘Jon’ is in communication with federal law enforcement because it’s within their Constitutional power to investigate federal crimes.
Stealing the Samsung, using the Internet to gain access to websites and computers, and interfering in interstate commerce, depriving the government of revenue via taxes is also criminal therefore all of these actions are crimes – including in both state and federal courts, punishable by imprisonment. Therefore, we’re asking the FBI to investigate these cyber crimes and years-long federal crimes including interstate transportation of stolen goods.
Questions and answers interview.
Interviewer: “‘Jon’ – Can you tell us what you want”
‘Jon’: “I want those responsible to call a conference to be attended by the leaders of the suspects and come up with a just compensation plan to be paid for the damages and good-faith compensation for the emotional and physical damages done by their misguided venture.
Interviewer: “Does that mean you want them prosecuted?
‘Jon’: “Absolutely, not! That is not up to me. The appropriate authority will have to determine the validity of that. The point I would like to make is, if they could afford to pay the alleged suspects to commit these acts of injustice then they should freely make amends to the victims. My own loving mother lost her life in this cyber war. She permanently branded this program with her own name so she would never be forgotten.
Interviewer: “So, what should they do right now?”
‘Jon’: “First they should drop this idea of invincibility and realize the voluminous data that was collected over the years that was stolen but also the volume of duplicate data that was stored and transferred to a secure place under the watchful eyes of security agents still exist. So, stealing the data from all of those devices were acts of futility.
Those are among the many reasons why resolving these issues as quickly as possible would be in their best interest. The number of witnesses to these crimes is long as some have offered to be whistleblowers as former insiders.
Secondly, they should find a neutral source to mediate the transfer the stolen assets and offer appropriate compensation to the victims. Locking the devices that are returned would be a sign of bad faith that will surely come up in any future trial.
“Oh, you considered murdering the victims?” Keep this in mind … That will turn theft into murder! That action will result in a complete roundup of everyone including the hackers who destroyed those websites. This will only make their years-long lives in prison longer and any future freedom an illusion.
One indisputable fact time has proven, failure to end a campaign of terror will result in prosecution and a very public criminal and civil trial. The families of those who were victimized sitting on the witness stand testifying will permanently damage their brand in the eyes of the public for years to come. Their own family members will keep asking – “Why did you do this to us?” Try explaining that to a 7-year-old.
Thirdly, we identified seven tech companies and one non-tech company who were implicated in these crimes over a period of 14 years. The companies involved may think that they will take their chances. Well, ask McDonald’s what happened when they faced a trial and wanted to take their chances? Smart leaders act smartly!
Keep in mind, our immediate number one concern is the replacement of the 23 cellphones, 14 computers, desktops and laptops as well as the Samsung Galaxy tablet that was locked and thus destroyed. You know how to contact ‘Jon’ after years of unsolicited contact. They may think a good lawyer could save them. Again, ask McDonald’s.
Smart leaders solve problems quickly. Failure almost always prolongs the pain and suffering as the costs continue to rise. Like the father who didn’t want to buy the milk for the baby because it costs too much. Ask him what the mother thought of that idea? Now the whole world knows what’s been going on. It can no longer be ignored! Act now!
Interviewer: “I hope everything works out for you. Please keep us posted.
‘Jon’: “Thanks for your support.”
‘Jon’: “America’s senior citizens and disable veterans need advance tech education and skills and I’m committed to bring it to the senior community, period! They don’t need to be attacked and maligned. Seniors are in need of care, help, and assistance and that is what we will deliver.”
Share these links and hashtags on Social Media:
Email these links and hashtags to friends:
Share This Article IV:
#HelpJonRecover
https://tinyurl.com/helpjonrecover
#GoldOverBlack
#TheAlphabetCompany
ALPHABET GLOBAL NEWS

Reliable. Trusted. Local. News.
On Mobile … Fast!
Written by
#AGNNewsDigital
Disclaimer: This post does not represent the views or viewpoint of the owner of AlpLocal.com, AGN News or its representatives or reporters. Any content which references any person, entity or group with similar names, descriptions, or business interest in any geographical location or similar businesses is merely a coincidence and not directed at said business. AGN News is compiled from submissions by contributors or other sources.
Additionally, this site may contain references to current or past news relating to people, places, things, business, or businesses, new business openings, startups, technology businesses, or any and all references to crimes, local, state or federal crimes. All postings contained herein are not for any purpose other than for educational purposes or for entertainment purposes only. Nothing herein should be considered investment or legal advice.
AGN News Digital is compiled from submissions by contributors or other sources are not responsible for any misrepresentations of implied misunderstandings. We are not responsible for information found on external links. Those clicking on these types of links bear sole responsibility for visiting these sites.