10 IP Theft Warning Signs
10 IP theft warning signs – and 10 more generated by AI
Here is a few IP theft warning signs aspiring writers should look out for. I’ll be sharing many real life examples of each point in good time. This is my opinion, please do share yours
.
1. CBG- Look out for anyone who works for Curtis Brown Group or anyone they are involved with! Be Careful!.
2. Synopsis - They’re uber interested in gaining synopses but pretend not to be. Synopses are being used to feed into Ai tools and to feed to their pet-writers to cut up and build books, shows and films. They are being dumped on the tables of shark tank writing rooms to be used as fish food for their shit shows.
3. Date- they backdate stories to use as a get out of jail clause. For example, the date an idea for a show may predate the date they stole your work, or they may circulate false dates long ago to represent that they already had the ideas. Sometimes shows, ideas and commissioned books are failing, about to collapse, so they steal work from Synopses to problem solve and make shit shows good. or even build the whole books or shows around your synopsis and pretend that it was something knocking about for years.
4. Feel- It feels like your work, it sounds like you, your voice and identity when your reading the voice of the book or watching the work. You have a feeling identification. Its more than words, its cadence, its beats, repetition, volume, pace, ticks, pet descriptors and even hidden meaning in the way you construct words. The fake writers do not. This is your writing fingerprint, it’s your mannerisms, your attitude, your aesthetic, your aura. It stinks of you. If its yours you will know it in your bones. Its like putting a mask on your child. You still know its them, by their walk, talk, movement, smell and even presence. You can listen with your eyes and look with your ears if only you pay attention.
5. Soulless- The fake writer or show fucks it all up and it feels wooden or soulless. The emotional and meaning of the work is missing.
6. Don’t understand words, technology and ideas- The fake writer try to steal your ideas, but they don’t understand them, so they just give up trying to explain and leave it all as loose ends, while using overly unambiguous terms which they read in your work, but they don’t understand and misuse, or use a slightly different term which they think means the same. Like AI, simulacrum, and quantum Physics. Quantum Physics, really, fucking really? That’s a field of study in science not a technology. It shows the fake writer hasn’t got a fucking scooby doo what she is copying. Its like me saying, he used Classical physics to make a banana, or he used human biology to kill the beast, or he was in the universe and that’s what happened. It’s stupid, so stupid that its offensive and wipe your feet on the readers level disrespect to them and the companies. It is absolutely 100% a fucking filthy and kick in the face sin, to not only the real writer but the companies who commissioned or paid for the fake book. This shows a blatant, spit on your grave level of disrespect and lack of loyalty and lack of honesty to the companies who commissioned this theft.
7. Subliminal blue details- because it’s just a rape job and they don’t actually do any work, they rush, the characters are cardboard spunk jobs, and the places are not well visualised. In the haste and lack of depth, they use the same, or very close details for things such as ages, places, names, descriptions, locations and times, even numbers in the text. This is because they have read it in the real writers work, so that is what fits in the gaps in their minds. Its subliminal messaging, its why you want Pizza after seeing it. It’s the reason companies put out advertisements. Think of a colour? I bet it’s the same as the only colour written in this article. And indeed weather, atmosphere and colours are details which fit this phenomenon.
8. Offbeat and threats- the writing style, voice, imagination, attitude and understanding is offish and feels fabricated and contrived, even forced. They will be offish, skittish and inconsistent around the real writer, interviewers and more to the point, on the stand in court while being cross-examined. At first they will threaten legal action against you and try to bully you to stay quiet about it. They might open bogus cases to put pressure on you. They will play victim, try to turn their crimes into your crimes, say that you are harassing them or bullying them, they will fake cry and they will scream bloody murder, making it worse and worse until they are finally found out, then they will be “sorry,” and will still passive aggressively blame all others. They’ll use smear campaigns and logical fallacy after logical fallacy, trying to do anything to draw the attention away from their crimes. Then they’ll pull a Harvey Weinstein and pull a sicky, walking with a Zimmer frame, appealing to gender, emotion and pity.
9. Plot points and pearls- everything that is working in the book, is a direct copy of your plot points, beats, style, ideas and even the whole skeleton of your writing, mixed up a little and a few changes to details like honey to cream and so on. Its taking a lightsabre and calling it a laser sword, its swapping Black for Dark, its taking the question of a mysterious young girl being real, an hallucination or a ghost, and saying she’s an unborn superhero. Its calling the perfect pinnacles of creation, an app but like, I don’t know how it works like, but it makes you perfect like. Its taking the plot of perfectionism and rubbing a little lube on it and pretending that make sense. Its taking a refrigerator in the kitchen and putting it in a wardrobe and writing the same lines. Its reading “Ai avatar” and changing it to app. Its taking a short story about the dangers of smartphones and feeding that message into the book like it was something the fake writer thought about. its taking a book about hypnotism and calling it blood light. Its taking an underground chamber in a nightclub In Soho London and putting it in an underground chamber in a nightclub in Soho New York. Its stitching together half-hearted stolen ideas and mashing them together like mincemeat and overcooking it until it’s on flames and burnt to dead black charcoal.
10. Evidence- If you listen and watch and monitor, they’ll tell you what they are up to, and hypocritically scorn the same behaviours and crimes which they have committed. They leave grubby evidence everywhere, including digitally.
It’s fucking filthy criminal behaviour.
Here are 10 AI generated warning signs of intellectual property (IP) theft that companies and individuals should watch out for:
1. Unexpected Employee Departures: Sudden or unexplained resignations, especially from employees with access to sensitive information, can be a red flag.
2. Unusual Data Access: Frequent or uncharacteristic access to confidential files, databases, or IP repositories by employees or contractors.
3. Increased Data Transfers: Large data transfers to external devices or emails, particularly if they involve sensitive or proprietary information.
4. Unauthorized Devices: The appearance of unauthorized devices, such as USB drives or external hard drives, connected to company computers.
5. Competitor Similarities: New products, services, or marketing strategies from competitors that closely resemble your own IP, suggesting possible theft.
6. Anomalous Network Activity: Unusual patterns in network traffic, such as spikes in data downloads or access from unrecognized IP addresses.
7. Disgruntled Employees: Employees expressing dissatisfaction or displaying negative attitudes, particularly those with access to important IP.
8. Non-Compliance with Security Policies: Employees or contractors consistently failing to adhere to established security protocols and policies.
9. Suspicious Behavior: Employees exhibiting secretive or unusual behavior, such as working odd hours or being overly protective of their workspace.
10. Missing Documents: The disappearance of physical or digital documents containing sensitive information.
Monitoring these signs and maintaining robust security measures can help protect against IP theft.