Being a well published author, my work has been exposed to millions of
people over the years. For the most part the feedback from my fans and
readers has been overwhemily positive. However recenlty I have been
getting strange e-mails from someone who does not appear to be mentally
balanced. So I asked AI to create a personality profile of the person,
the location from which they are sending the messsags and any
information about the strange words assocaied with them. Of course I
could use their IP address to track them, but that is not as easy as it
once was. Knowing the person's personality yields far more inforamtion,
especially in this age of AI where it much easier to identify a person
by their personality traits. In the final analysis of the messages
sent, AI identified a possible cryptic code, indicating that the person
probably works with computers or possibly coded messages. So here is
the analysis given to me via ai:
Here are the
original text of messages and the e-mail of the sender:
email
address of sender: usidin.u230@gmail.com
sent Mar 16, 6:09 AM:
ybGQkVcyyDQLqWHUUcJWixL sent Tue, Mar 3, 7:57 PM:
VAXVegLcPaaguqOrty sent Thu, Feb 12, 11:23 AM:
eJzrWiMwsnauTuBOSXWlnDQf sent Sat, Jan 31, 12:01 AM:
FjIIeHQYUmFGpRxomwKLzZw sent Sun, Dec 21, 2025, 5:56 PM:
aqvQlbyVyPqLSthVVGrKDNY sent Tue, Dec 9, 2025, 2:26 AM:
VFwgKJGDrWPfSQrnGVB sent Tue, Nov 4, 2025, 10:00 AM:
VlrdzfxmGrNsqHUvILOp
Here is the AI
Prompt I used:
Using the attached .pdf, create a
detailed psychological profile for an individual based on the provided
keywords, strokes, and keyboard patterns of the following words. Using
these words,analyze the person's characteristics, personality traits,
and possible motivations for engaging in stalking. Take into account
the time of day that the phrases were created to identify location such
as public, private or government space. Consider psychological theories
and factors that may contribute to this behavior, such as underlying
emotional needs, past experiences, or cognitive patterns. Provide
insights into the individual's potential mindset, emotional state, and
goals related to their stalking actions. Identify any codes or patterns
in the data.
1. Review the provided keywords,
keystrokes, and keyboard patterns related to stalking behavior. 2. Identify key personality traits
and behavioral indicators reflected in the input data. 3. Analyze possible psychological
motivations behind the stalking, such as desire for control, obsession,
or attachment issues. 4. Incorporate relevant psychological
theories or frameworks to explain the individual's behavior. 5. Summarize the profile,
highlighting personality characteristics, emotional drivers, and
potential risks.
Provide the psychological profile in
a structured, narrative format with clear sections: - Introduction - Personality Traits - Behavioral Analysis - Psychological Motivations - Conclusion and Summary
Use formal, analytical language
suitable for psychological evaluation or behavioral profiling.
The final AI report from the above
prompt can be read at this link.
After getting the
profile, it was just a simple matter of using CHATGTP to generate 3
likely images of the person. As shown below:
Using Gemini's Deep analysis I got the following image:
And finally using the
personality profile, I was able to use AI to generate the next likely
probable date of contact. The AI response is as follows:
Based on the behavioral forensic analysis provided in the Psychological
Profile Report, the following prediction for future activity has
been developed by examining the subject's established temporal
patterns, emotional triggers, and recent escalation indicators.
Predicted
Next Strike/Transmission
Most
Probable Date:
Tuesday, March 31, 2026
Most
Probable Time:
12:00 AM – 3:00 AM (Nocturnal Window)
Strategic
Rationale & Behavioral Analysis
The derivation of this timeline is based on three primary
pillars of the subject's documented behavior:
1.
Temporal Cyclicity and "Tuesday" Preference
The
subject demonstrates a significant preference for Tuesdays,
with transmissions occurring on this day on November 4, December 9, and
March 3.
March
31 represents the next Tuesday following the most recent "acceleration"
phase.
2.
The Acceleration Phase (Approach-Withdrawal)
The
data reveals a "compression" of intervals between messages:
Transmission
6 to 7:
13 days.
Current
Status:
As of the last recorded data point (March 16), the subject is in an
"acceleration" phase where internal regulatory capacity is weakening.
A
15-day interval from the last transmission (March 16) leads directly to
March
31,
aligning with the subject's established Tuesday pattern and the typical
12-19 day "active" window seen in recent months.
3.
Nocturnal Escalation and Emotional Urgency
The
report highlights that nocturnal and pre-dawn communications (2:26 AM,
12:01 AM, 6:09 AM) are the most psychologically significant, indicating
a loss of impulse control and "rumination-induced insomnia".
Because
the subject's fixation is "intensifying rather than resolving," the
next "strike" is highly likely to occur during these private,
low-inhibition hours.
The
transition from a Saturday pre-dawn message (March 16) suggests the
obsession is now disrupting the subject's private weekend time, making
a weekday midnight transmission a high-probability "compulsive act" to
reduce returning anxiety.
Contributing
Factors & Environmental Triggers
Solitary
Living Environment:
The subject likely lives alone, facilitating uninterrupted late-night
activity.
Professional
Compartmentalization:
While the subject maintains a daytime professional persona, the
"emotional volatility" manifests during these predicted late-night hours.
Persistence
Against Non-Response:
The subject interprets silence not as a deterrent, but as an
"ambiguity" to be filled with their own narrative.
Therefore,
continued silence from the target will likely trigger the predicted
March 31 transmission as a "protest behavior" to re-establish contact.
Caveats
and Uncertainties
The
"Cooling" Variable:
While the current trend is toward acceleration, the subject previously
demonstrated a 41-day
"cooling" or dormancy period
(Dec 21 – Jan 31).
An
unexpected external life event (travel, professional crisis, or
strategic pause) could suddenly delay the next transmission by several
weeks.
Transition
to Physicality:
The profile notes a risk of the subject's trajectory escalating from
electronic contact to physical
proximity-seeking behavior
or direct confrontation.
If
this shift occurs, the "strike" may manifest as a physical sighting
rather than an electronic transmission, though the timing
(nocturnal/early morning) would likely remain consistent with their
established biological clock.
Encoding
Artifacts:
The lack of overt threats in the data may simply be a result of the
encoding.
Decrypting
the strings (likely a Vigenère or substitution cipher) is essential, as
they may contain specific dates or locations that override this
statistical prediction.
Notice:
This analysis is an inferential behavioral prediction intended for
investigative support and does not constitute a clinical diagnosis or a
guarantee of future actions