Born in Anchorage Alaska, I grew up in Georgia, moved back to the Pacific Northwest and settled for years work as a Surfman for the USCG in Alaska Oregon Washington Texas . I now live in Corpus Christi Area ), TX.. I am a proud father of 3 girls & 1 son, Retired Chief in the United States Coast Guard, Spearfisherman, Big Game Hunter, Cameraman, and graduate of FreeDiving International L1 Program. I once created Rigs & Reef Classic with a few goals! I am blessed with previously working in the military & outdoor industry and the Spearfishing Industry! We are full of amazing divers, and Company's who respect our waters! I want to promote this in Texas Waters eventually…
Matthew 7:23, where Jesus says, “Then I will tell them plainly, ‘I never knew you; depart from me, you evildoers!'” (NIV), highlighting that outward religious acts aren’t enough for salvation; true knowing of God and doing His will is required. It’s part of Jesus’ teaching in Matthew 7:21-23 about false prophets and the narrow gate, warning that merely saying “Lord, Lord” or performing miracles in His name isn’t sufficient if there isn’t a genuine, heart-level relationship with Him.
Key Context & Meaning:
False Professors: Jesus describes people who claim religious authority, perform works, and cast out demons in His name, but who didn’t truly follow God’s will.
“I Never Knew You”: This signifies a lack of genuine intimacy, relationship, and personal knowledge, not just a lack of awareness, according to Bible Study Tools.
“Depart From Me, You Evildoers/Workers of Lawlessness”: Jesus tells them to leave because their actions stemmed from self-interest or disobedience, not love for God.
True Knowing: Salvation comes from a deep, personal relationship with Jesus, involving obedience and doing the will of God, not just religious performance, as explained in Soul Survival.
“I never knew you” appears in
Matthew 7:23, a passage from Jesus’ Sermon on the Mount emphasizing the difference between external religious actions and a genuine relationship with God.
This passage highlights that entering the kingdom of heaven requires doing the will of the Father, not merely saying “Lord, Lord”. The word “knew” in this context signifies a personal and intimate connection, not just intellectual familiarity. Jesus’ warning is directed towards those who perform spiritual deeds but lack true faith, calling them “workers of lawlessness,” which implies rebellion against God’s commands.
Similar warnings appear in other parts of the Bible. For example, Luke 13:25–27 includes Jesus saying, “I do not know where you come from. Depart from me, all you workers of evil!”. Matthew 25:11–12, from the Parable of the Ten Virgins, quotes the bridegroom saying, “Truly, I say to you, I do not know you”. Additionally, 2 Timothy 2:19 mentions, “The Lord knows those who are His”.
Don’t get a dime for what I create or my blogs since 2009
#BlackNbluepaintball
#rigsreefclassicspearfishing
#saltysoultaxidermy
#spearfishingtalk Facebook group
Built it all don’t get paid for nothing…
David Michael Ramsey (they stole it all)! ~ surfman374 rigsreefclassicspearfishing.com
Gator-Gripp.com
BlacknBluePaintball.com
#DMR
#homeless everyone took it every thing i own is in my Tacoma what’s left of my life what i did … #corpuschristi #texas 💙❤️🛟🇺🇸
Spend your best 20 years of your lives protecting America and saving 30,000-100,000 lives arctic rescue surf rescue and hurricane rescues defend Americas coast lines protect Americas fisheries enforcing all federal laws and treaties and they smoke ya when you retire teach 1000’s of Coasties to fire handguns long guns machine guns m240bravo’s offshore onshore protect texas from mexicos & central / South America global illegal harvesting of fish gun running drug running human trafficking cyber attacks protect fisheries on westcoast ensure public are safe on the water build 100’s of homes for women men children in need and I end up homeless everything lost stolen cheater liars thieves suck! 100% combat related permanent disability from doing my job! And I get shit on loose 3 homes have my vehicles tundra Tacoma broke into flat tires homes vandalized vehicles trashed all my outdoor life style gear stolen everything I owned gonne heck yeah it sucks… @surfman374 #rigsreefclassicspearfishing #saltysoultaxidermy #spearfishingtalk
I’m not a terrorist, not a drunk, not a drug addict never cheated never abused yes at times my mouth was hard to handle but two sides too everything BTW mind you I pay $2200 child support can see my children cried there whole life because I still haven’t been able too… was hard enough standing duty missing holidays birthdays vacations even harder when they steal everything you did to prepare for retirement … we pay the bills the whole time were married they run off with everything … yeah it sucks sure it’s awesome when your spouse works the times they did it helped but millions agree military pay ain’t the best till you get rank glad I retired Chief 2018 sad it wasn’t master chief with 30 years when ya loose half your TSP in divorce and someone steals your identity all your guns and equipment to work #saltysoultaxidermy #gatorgrippdotcom it really sucks! Tattoo artist taxidermy 100ton MMD government construction project manager SCIF San Antonio Microsoft loose all my commercial grade meat production equipment and camera equipment advanced outdoor film and production loose my bows gold prospecting equipment sucks! When people destroy what you had for 20-30 years sucks! Have ivory stolen sucks now all I have left is clothes and air mattress construction equipment stolen sucks tools sucks power equipment sucks yeti coolers ain’t cheap I owned 4 2-250, and 2 almost as big were talking shit loads stolen all because people attacked me people fucked my shit up stole from me. Trust me the real story is hell! Boat and motor all my taxidermy everything gone my entire life poof … BMCRamsey Surfman374 David Michael Ramsey (503)298-0592
100 % Disabled
100 % Service Connected
100 % Combat Related
Veteran USCoastGuard BMCRamsey
1115568 ~ The 374th Surfman @surfman374 (Instagram)
DAndLGunsAndGame #Washington #FFL #FederalFireArmsLicense issued to me not only did they steal all my dealer paperwork but the stole all my personal firearms ! @surfman374 between 2022-Present date! #CorpusChristiTexas #youStopeMyDealerPaperWork so now I have nothing to show for lawful gun transfer and purchase wow y’all! Thanks! #GunTheft #GunDealerTheft #CorpusChristiTexas Anacua St! Btw my entire dealer paperwork doesn’t just go missing it was stolen along with gold sperm ivory and a few other things before EnnisJoslin Cleaned me out! #DavidMichaelRamsey #The374thSurdmanUSCoastGuard yes I was a Gun Dealer btw I know not only the laws I enforced for the coast guard but ATF as well!
Was my name for my FFL Federal firearms License Washington State DavidMichaelRamsey Surfman374 USCoastGuard
“And they stole all my registered Firearms!”.
+11
Yes, both
stealing guns and engaging in an illegal gun transfer are serious crimes under federal and state laws, often punishable by substantial fines and imprisonment. These actions are major channels through which firearms enter the illegal market.
Stealing Guns
Federal Law: Stealing a firearm from a person or a federally licensed dealer is a federal crime, regardless of the gun’s monetary value. A conviction can result in up to 10 years in prison.
State Law: State laws also criminalize firearm theft. For example, in Virginia, firearm theft is always charged as grand larceny, which carries a potential prison sentence of up to 20 years.
Reporting Requirements: Federal Firearms Licensees (FFLs) are required to report the theft or loss of a firearm from their inventory to the ATF and local law enforcement within 48 hours of discovery. While federal law does not mandate private citizens to report a stolen firearm, many states have enacted their own laws requiring owners to report lost or stolen weapons within a specific timeframe (e.g., 48 hours).
Illegal Gun Transfer
An illegal gun transfer involves moving a firearm from legal to illegal commerce. It encompasses several activities, including:
Straw Purchasing: This occurs when a person buys a gun on behalf of someone else, especially a “prohibited person” (e.g., a convicted felon, fugitive, or unlawful drug user) who cannot legally purchase a firearm themselves.
Transfer to Prohibited Persons: It is a federal crime to knowingly transfer a firearm to someone who is legally prohibited from possessing one.
Interstate Transfers: Generally, an unlicensed person cannot transfer a firearm to an unlicensed person who resides in a different state. The transaction must be facilitated through an FFL in the recipient’s home state, involving a background check (NICS) and required paperwork.
Unlicensed Dealing: Engaging in the business of selling firearms without a Federal Firearms License is illegal.
Failure to Follow Procedure: FFLs who knowingly fail to follow required procedures, such as performing a background check for every transfer to a non-licensee, may face penalties.
Individuals considering transferring a firearm should consult federal law through the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) website and contact their State Attorney General’s Office to ensure compliance with all applicable laws.
Make It Bold | Be About It | Talk About It 💙 #HUSTLR 🛡I spent 20 Years serving the United States of America. BMCRamsey, Surfman374. It was an amazing career as a Ready for Operations Inspector, Chief of Operations for the Largest Enlisted Unit in the Coast Guard, Small Arms Instructor, Federal Law Enforcement Officer (Boarding Officer) Surfman. I Graduated Airforce NCOA, held a FFL for Legal FireArms Transfers for Coasties D&LGunsAndGame USCG Chiefs Academy Altus Tendo. Instructor Development School, Advanced Outdoor Film and Production School, and from 2005-2021 held a 100Ton MMD Captian License. I received the Associations for Rescue’s at Sea Gold Medal in Washington D.C. along with numerous other Medals and Awards for Rescues 100’s of 1000’s in 20 years serving. Yes I’m 100% Percent Disabled 100% Service Connected 100% Combat Related don’t let it stop me. Life is yours enjoy it create it Daily. Proud Retired Chief Loving Man, Veteran, and Father. #DepartmentofHomelandSecurity MLEA U.S. Coast Guard Boarding Officers & Boarding Team Members. It’s #SetStandard #TacticsTechniques #TheUseofForce God Bless my prayers for #FLEO’s Every Believer U.S. Department of Homeland Security #surfman374 #rigsreefclassicspearfishing #gatorgripphd #pullsetgrip #chief #LEO #LifeMatters #protectandserve ❤️🤍💙”God Bless Founder #DMR @surfman374 #SaltySoulTaxidermy #TripleDigitHunter
rigsreefclassicspearfishing.com
Have you seen any of my property it All got stolen from me
They stole my identity’s 4-21-2022 to present date and all my books I hand wrote about where I found my gold and how I saved 100,000 souls
Have you seen my stuff? David Michael Ramsey missing an #AftasGoldMedal #Texas and my Sword and ShadowBox Guns, Gold, Walrus Tusk …. #DMR #The374thSurfmanUSCoastGuard @surfman374 Instagram account is my personal account nothing for sale on it …
#WestPointClinic rocks … #OUTBound with nothing but my #saltysoul #dmr #The374thSurfmanUSCoastGuard David Michael Ramsey … ❤️🛟💙🇺🇸🤍🩸🥰👊🎵👍💕✌️😎⛪️🙏👌🔔🛐💡🙈💒🤣🤪😘 @surfman374 (Instagram) got to say hey to the #VETCourt and speak about how it impacts our lives in a better way
– ask for help! The VA Cares
– Share Your Story
– Locked Up VS getting Help! I say forgiveness and heal is better than
• sitting in a cell
• going crazy because you have no phone food sucks and your hanging out with people who commit Cyber CrImes or crimes you may have spent 20Yrs Fighting (Cartel MCs Mafia and Gangs) Texas 🇺🇸
• do you know what it’s like to be a CoastGuard Federal Law Enforcement Officer eating with Cyber CrImes (Cartel MCs Mafia and Gangs) Texas 🇺🇸 for a year trust me you end up beat up raped or dead
Tulsi Gabbard rocks I think they all do David Michael Ramsey ❤️🛟💙🇺🇸🙈💒🤪😘🤣💡👌🛐⛪️😎🙏🔔💕✌️👍🎵🤍🩸🥰👊😍 so does #PamBondi something about being a founding memberr of #DHSGOV that gets me excited about #DNI #DOJ #DOW
🤔 maybe because i spent 20years fighting
GlobalWarOnTerror
HumamTrafficking
WarOnDrugs
cyberWar
Borderwar
Alaska • Oregon • Washington • Texas to places way beyond our shores patrolling protection and life saving
My favorite women leaders –
Pam Bondi
TulsiGabbard
AnnaLuna
MayraFlores
AOC
@Sec_Noem (Kristi is BadAss they all are)!
Our FLOTUS and her beautiful Family i could keep foo g (our mayor) all the bad ass republicans trying to make office in texas ❤️🛟💙🇺🇸
#WestPointClinic rocks … #Inbound with nothing but my #saltysoul #dmr #The374thSurfmanUSCoastGuard David Michael Ramsey … ❤️🛟💙🇺🇸🤍🩸🥰👊🎵👍💕✌️😎⛪️🙏👌🔔🛐💡🙈💒🤣🤪😘
Amen thankyou GOD for for the meal and bed love you LORD of Lords thankyou JESUS CHRIST for being the final sacrifice for the NEWCovenant Amen #TheFinalSacrifice #TheGoldenAge GOD Bless Americans, our @Potus @Flotus #TheWhiteHouse our @DHSGOV @USCG @Sec_Noem @RepLuna @AOC @TulsiGabbard amen .. our Mayor, Courts Our Judges And Attorneys our Police whom Protect our Communities our FireFighters & EMS Docters & Nurses specially after the week I have had… #loveyouLORD GodBless #WomenLeadership and #TheHonorableGregAbbott (Texas) Governor, #TheHonorableLaurenBoebert #Longworthhouse #TheHonorableDanCrenshaw #KingwoodTX and all those in the #CannonHouseOfficeBuilding #WashingtonDC #AstoriaOffice #QueensNewYork #SeminoleFlorida #BronxNewYork #CorpusChristiTx #PortlandTexas #SintonTx #OdemTx #CalallenTx #PortO #PortA #PortMansfield #SouthPadreIsland and all sinners & Saints may #ArchAngelMichael Gabriel Uriel Raphael watch over us all and protect us all today amen
100 % Disabled
100 % Service Connected
100 % Combat Related
Veteran USCoastGuard BMCRamsey
1115568 ~ The 374th Surfman @surfman374 (Instagram)
say the #Glorybetothefather announce the first mystery say TheOurFather , Say 10 “HailMarys while meditating on the Mystery Say the Glory be the father Announce the Second Mystery then say the Our Father –
• Our Father, who art in heaven, hallowed be thy name;
• Thy kingdom come; thy will be done on earth as it is in heaven.
• Give us this day our daily bread;
• And forgive us our trespasses, as we forgive those who trespass against us;
• And lead us not into temptation, but deliver us from evil.
• Amen.
• Hail Mary, full of grace, the Lord is with thee. Blessed art thou among women, and blessed is the fruit of thy womb, Jesus.
• Holy Mary, Mother of God, pray for us sinners, now and at the hour of our death. Amen.
Glory be the Father, and to the Son, and to the HolySpirit. as it was in the beginning, is now, and shall be, world without end. Amen #HowToPrayTheRosary
(Repeat the HailMary & Glory be to the father) – & cont. with the 3rd, 4th, & 5th Mysteries .. #GODISGOOD
all the time , love y’all (Don’t forget to be forgiving to yourself and others) ( #LoveAndForgiveness ) ⛪️💒🔔🛐
David Michael Ramsey
100 % Disabled
100 % Service Connected
100 % Combat Related
Veteran USCoastGuard BMCRamsey
1115568 ~ The 374th Surfman @surfman374 (Instagram)
Don’t get a dime for what I create or my blogs since 2009
#BlackNbluepaintball
#rigsreefclassicspearfishing
#saltysoultaxidermy
#spearfishingtalk Facebook group
Built it all don’t get paid for nothing…
David Michael Ramsey (they stole it all)! ~ surfman374 rigsreefclassicspearfishing.com
Gator-Gripp.com
BlacknBluePaintball.com
#DMR
#homeless everyone took it every thing i own is in my Tacoma what’s left of my life what i did … #corpuschristi #texas 💙❤️🛟🇺🇸
Whistleblower protections in Texas vary significantly between the public and private sectors, often leaving many workers with limited legal recourse.
Key Protections
Texas Whistleblower Act: This is the primary protection for public employees (state or local government workers). It prohibits government entities from retaliating against employees who report a violation of law in good faith to an appropriate law enforcement authority. Remedies can include:
Reinstatement of employment and seniority.
Compensation for lost wages and benefits.
Reimbursement for court costs and attorney fees.
Texas Medicaid Fraud Prevention Act: This law specifically protects individuals who expose Medicaid fraud through “qui tam” lawsuits. Whistleblowers may receive 15% to 30% of any recovered funds as a reward.
Specific Industry Protections: Texas labor codes provide limited protections for reporting certain issues, such as child abuse (for educators), elder abuse, or specific healthcare safety violations.
Significant Limitations
No General Private Sector Protection: Texas does not have a general whistleblower law for private-sector employees. Most private workers rely on a patchwork of federal laws (like OSHA for safety or Sarbanes-Oxley for financial fraud) rather than state-level protections.
“Appropriate Law Enforcement” Requirement:Under the Texas Whistleblower Act, a public employee must report to an authority authorized to investigate or prosecute the specific law violated. Reporting to a supervisor or an internal compliance department often disqualifies the employee from state protection.
Strict Deadlines: Public employees must typically initiate a formal grievance procedure within 90 days of the retaliatory act before they can file a lawsuit.
At-Will Employment: As an at-will state, private employers can generally terminate employees for any reason not prohibited by specific statutes, making it difficult for whistleblowers to prove their firing was illegal retaliation.
Recent Legislative Efforts
Whistleblower Protection and Accountability Act (2025/2026): Recent legislative proposals, such as House Bill 3893, aimed to expand protections to private-sector employees and establish a Texas Whistleblower Oversight Commission (TWOC). Key goals included increasing fines for retaliation to $500,000 and creating a support fund for whistleblowers facing legal costs.
Public corruption in Texas is often attributed to a combination of legal loopholes, one-party dominance, and specific regional pressures. Recent polling shows that 18% of Texas voters consider political corruption the state’s most pressing issue, ranking it above inflation and immigration.
Key factors contributing to the perception and reality of high corruption in the state include:
1. Lack of Campaign Finance Limits
Texas is one of the few states that has no limits on individual campaign contributions to candidates for state office.
Wealthy Influence: This allows a small number of “megadonors” to exert significant influence over the political system. For example, in the 2010 cycle, just 204 individuals provided $70 million of the $200 million raised by candidates.
Contractor Donations: State contractors are permitted to give millions to high-level officials, creating what critics call a “pay-to-play” perception that is prohibited in many other states and at the federal level.
2. One-Party Dominance
Texas has essentially operated as a one-party state since the current constitution was written in 1876, with Republicans holding every statewide office since 1994.
Unchecked Power: Critics argue that when one party holds absolute control for decades, it creates an environment where power goes unchecked and officials become increasingly brazen.
Weak Oversight: Nearly 90% of corruption cases investigated by the Texas Rangers are not prosecuted, often due to local prosecutors having the option to drop charges against political allies in their home districts.
3. Regional Corruption (South Texas & The Border)
South Texas, specifically the Rio Grande Valley, has historically high rates of corruption convictions.
Drug Trafficking: The region’s proximity to major drug corridors means vast amounts of illegal money are available to corrupt public officials. Law enforcement and local leaders have occasionally been found shielding traffickers for “pay-to-play” bribes.
Economic Vulnerability: In impoverished communities, those who control sizable government contracts become targets for bribery by contractors and other operators.
4. Recent High-Profile Scandals
Attorney General Ken Paxton: Paxton has faced numerous corruption allegations, including a 2023 impeachment trial (where he was acquitted by the State Senate) and a long-running federal probe that the Justice Department recently declined to prosecute.
Legislative Investigations: In 2025, Governor Abbott directed investigations into House Democrats for allegedly soliciting funds to “flee” and break quorum, while Attorney General Paxton investigated Soros-funded PACs for similar activities.
5. Weak Institutional Enforcement
The Texas Ethics Commission is frequently described by reform advocates as understaffed and lacking the robust investigative and enforcement powers needed to hold officeholders accountable.
high corruption in Texas stems from a combination of weak campaign finance laws allowing heavy donor influence, one-party dominance in certain regions creating limited oversight, and high-stakes border-related illicit activities. Key factors include “pay-to-play” politics, with over (\$150) million in donor money impacting legislative agendas, and a “compadre system” in South Texas. Campaign Finance & Donor Influence: Common Cause Texas reports that limited regulations allow a few individuals and corporations to hold significant influence over state policy, often prioritizing donors over public interest.Border Region Corruption: The FBI and other sources note that the illicit drug trade and high-value, unregulated money in border areas encourage partnerships between traffickers and local law enforcement officials.One-Party Control: In some regions, particularly South Texas, the lack of a competitive, opposing political party with authority leads to reduced accountability.Erosion of Ethics Standards: Investigations into, for example, the COVID-19 task force showed that many members were major donors to the governor’s re-election, a pattern that some observers say contributes to a perception of declining democratic norms. While some studies rank Texas in the middle of the pack for overall corruption, it is frequently cited by Texans as a top concern, especially regarding state-level leadership and political influence. @surfman374 💙🛟❤️🇺🇸💒🎵😘💡🩸💕😎
That’s why my Instagram is called (Surfman374) I’m the #374thSurfmanUSCoastGuard and they stole my whole life made me a trustee framer and walk 100’s of miles rigsreefclassicspearfishing.com #100percentdisabled #100percentcombatrelated and accused me of capital riots looked for cocaine in my home and truck and a dead body! Then accuse me of shit I never did and gave me a year in jail Nueces county annex and san Patricio … for liars cheaters thieves and corrupt cover ups! @surfman374 💙🛟❤️🇺🇸
Make It Bold | Be About It | Talk About It 💙 #HUSTLR 🛡I spent 20 Years serving the United States of America. BMCRamsey, Surfman374. It was an amazing career as a Ready for Operations Inspector, Chief of Operations for the Largest Enlisted Unit in the Coast Guard, Small Arms Instructor, Federal Law Enforcement Officer (Boarding Officer) Surfman. I Graduated Airforce NCOA, USCG Chiefs Academy Altus Tendo. Instructor Development School, Advanced Outdoor Film and Production School, and from 2005-2021 held a 100Ton MMD Captian License. I received the Associations for Rescue’s at Sea Gold Medal in Washington D.C. along with numerous other Medals and Awards for Rescues 100’s of 1000’s in 20 years serving. Yes I’m 100% Percent Disabled 100% Service Connected 100% Combat Related don’t let it stop me. Life is yours enjoy it create it Daily. Proud Retired Chief Loving Man, Veteran, and Father. #DepartmentofHomelandSecurity MLEA U.S. Coast Guard Boarding Officers & Boarding Team Members. It’s #SetStandard #TacticsTechniques #TheUseofForce God Bless my prayers for #FLEO’s Every Believer U.S. Department of Homeland Security #surfman374 #rigsreefclassicspearfishing #gatorgripphd #pullsetgrip #chief #LEO #LifeMatters #protectandserve ❤️🤍💙”God Bless Founder #DMR @surfman374 #SaltySoulTaxidermy #TripleDigitHunter
rigsreefclassicspearfishing.com
Birth certificate drivers License Social security card Guns Gold Ivory Taxidermy Mounts Medical Bed Leather couches Retirement sword ShadowBox Challenge Coins Military Uniforms Military Covers from every unit All my very ancient artwork and very special gifts from global travels @surfman374 that ivory was worth over $30,000 the couches $10,000 the guitars the gold the minerals the artwork priceless gifts the Japanese Glass floats from alutian islands the AlaskanNative art the flat hides and taxidermy over $50,000 worth the upgrades from VA, SocialSecurity And 3mhearingloss all gone! Over $30,000 in boat motor metal detecting and back country prospecting gear over $10,000 in freedivescuba gear over $30,000 ℹ tactical gear over $30,000 in camera and outdoor film and production equipment priceless gifts painting artwork custom knives you name it the comics and baseball cards $50,000 that’s just in the last 12 months that does include 3 divorces which resulted in total loss of my property millions lost to liars cheaters thieves not to mention a BrandTrademarkpatent (gator-gripp).com not to mention a paintball field blacknbluepaintball @Surfman374 $50,000 in construction equipment $25,000 in taxidermy equipment $10,0000 in meat processing equipment $30,000 in reloading and weapons equipment 🛟❤️🇺🇸
Stolen valor refers to the act of falsely claiming to have served in the military or to have earned military medals and honors, often for personal gain, prestige, or to deceive others, and it’s a phenomenon that has led to federal laws like the
Stolen Valor Act in the U.S., criminalizing the fraudulent wearing of military decorations or misrepresentation of service for tangible benefits. It harms genuine veterans by devaluing their sacrifices and exploits the respect military service commands, with penalties varying from fines to imprisonment, depending on the intent and specific actions, such as impersonating a service member or fraudulently obtaining benefits
.
What it involves:
Wearing unauthorized military uniforms or medals.
Falsely claiming combat experience, specific ranks, or injuries.
Fabricating stories about military service or heroic acts.
Using fraudulent documents or stolen identities.
Why people do it:
Financial Gain: Obtaining veteran benefits, discounts, or merchandise.
Social Status: Seeking prestige, respect, or credibility.
Psychological Reasons: Sometimes linked to trauma or a desire to fit in.
Legal consequences:
Stolen Valor Act (2013): Makes it a federal crime to fraudulently claim to have received certain high honors (like the Medal of Honor, Silver Star, Purple Heart) with the intent to obtain money, property, or other benefits.
Penalties: Can include fines, up to a year in prison, or both, for violations.
Uniform Code of Military Justice (UCMJ): Applies to active-duty personnel for such offenses.
Impact:
Devalues the service and sacrifices of actual veterans.
Erodes public trust in military claims and honors.
How it’s exposed:
Inconsistencies in uniforms, stories, or documents.
Investigations by veteran groups or online communities dedicated to exposing impostors.
That’s why my Instagram is called (Surfman374) I’m the #374thSurfmanUSCoastGuard and they stole my whole life made me a trustee framer and walk 100’s of miles rigsreefclassicspearfishing.com #100percentdisabled #100percentcombatrelated and accused me of capital riots looked for cocaine in my home and truck and a dead body! Then accuse me of shit I never did and gave me a year in jail Nueces county annex and san Patricio … for liars cheaters thieves and corrupt cover ups! @surfman374 💙🛟❤️🇺🇸
THECRIMESurfman374
In 2026, data theft has evolved from simple breaches to highly automated, AI-driven operations that target the core of digital trust and interconnected business ecosystems.
1. AI-Powered “Agentic” Attacks
Autonomous Breach Chains: For the first time, fully autonomous AI agents are being used to execute entire attack cycles—from initial reconnaissance and vulnerability scanning to lateral movement and data exfiltration—without human intervention.
Real-Time Adaptive Malware: Criminals utilize AI to mutate malicious code in real-time, allowing it to bypass traditional static security detections and adapt to a network’s specific defenses.
Hyper-Personalized Phishing: Attackers use large language models (LLMs) to analyze stolen data and social media, crafting flawless phishing lures that mimic a specific person’s tone and writing style.
2. Identity and Synthetic Fraud
Synthetic Identity Theft: Attackers are moving beyond stealing real identities to creating “synthetic identities” by combining stolen data with AI-generated information. These are used to gain unauthorized access to systems or commit large-scale financial fraud.
Deepfake Deception: Sophisticated deepfake audio and video campaigns are increasingly used to impersonate executives (vishing) or colleagues to authorize fraudulent fund transfers or disclose sensitive credentials.
Identity as the Perimeter: With traditional network perimeters fading, identity has become the primary attack surface. This includes session hijacking, token theft, and “MFA fatigue” attacks designed to bypass multi-factor authentication.
3. Supply Chain and “Shadow AI” Risk
Third-Party Compounding: Third-party vendor involvement now accounts for approximately 30% of all data breaches, as attackers target small, specialized vendors to reach thousands of downstream customers at once.
Shadow AI and Data Poisoning: The unauthorized use of AI tools by employees (“Shadow AI”) has surpassed traditional shadow IT as a major risk. A rising trend in 2026 is data poisoning, where attackers invisibly corrupt the datasets used to train a company’s core AI models.
API Exploitation: Attackers increasingly target “shadow” or unmanaged APIs, which often lack the same level of monitoring as traditional web interfaces, to exfiltrate large volumes of data.
4. Evolution of Extortion
Extortion-Only Attacks: Some ransomware groups have shifted away from encrypting data entirely, moving straight to data theft and extortion. This renders backup and recovery strategies irrelevant since the threat is the public exposure of the data.
Harvest Now, Decrypt Later: In preparation for the arrival of powerful quantum computers, state-sponsored actors are stealing encrypted data now with the intent to decrypt it once quantum technology becomes widely available.
5. Growing Vulnerabilities in Emerging Tech
Cloud & Virtualization: Attackers are increasingly targeting virtualization infrastructure and misconfigured cloud-native environments to gain high-level administrative access.
OT and IT Convergence: As critical infrastructure and manufacturing (OT) merge with corporate networks (IT), attackers are finding new ways to steal proprietary data from factory floors and disrupt physical production lines.
2026, data theft has evolved from simple breaches to highly automated, AI-driven operations that target the core of digital trust and interconnected business ecosystems.
1. AI-Powered “Agentic” Attacks
Autonomous Breach Chains: For the first time, fully autonomous AI agents are being used to execute entire attack cycles—from initial reconnaissance and vulnerability scanning to lateral movement and data exfiltration—without human intervention.
Real-Time Adaptive Malware: Criminals utilize AI to mutate malicious code in real-time, allowing it to bypass traditional static security detections and adapt to a network’s specific defenses.
Hyper-Personalized Phishing: Attackers use large language models (LLMs) to analyze stolen data and social media, crafting flawless phishing lures that mimic a specific person’s tone and writing style.
2. Identity and Synthetic Fraud
Synthetic Identity Theft: Attackers are moving beyond stealing real identities to creating “synthetic identities” by combining stolen data with AI-generated information. These are used to gain unauthorized access to systems or commit large-scale financial fraud.
Deepfake Deception: Sophisticated deepfake audio and video campaigns are increasingly used to impersonate executives (vishing) or colleagues to authorize fraudulent fund transfers or disclose sensitive credentials.
Identity as the Perimeter: With traditional network perimeters fading, identity has become the primary attack surface. This includes session hijacking, token theft, and “MFA fatigue” attacks designed to bypass multi-factor authentication.
3. Supply Chain and “Shadow AI” Risk
Third-Party Compounding: Third-party vendor involvement now accounts for approximately 30% of all data breaches, as attackers target small, specialized vendors to reach thousands of downstream customers at once.
Shadow AI and Data Poisoning: The unauthorized use of AI tools by employees (“Shadow AI”) has surpassed traditional shadow IT as a major risk. A rising trend in 2026 is data poisoning, where attackers invisibly corrupt the datasets used to train a company’s core AI models.
API Exploitation: Attackers increasingly target “shadow” or unmanaged APIs, which often lack the same level of monitoring as traditional web interfaces, to exfiltrate large volumes of data.
4. Evolution of Extortion
Extortion-Only Attacks: Some ransomware groups have shifted away from encrypting data entirely, moving straight to data theft and extortion. This renders backup and recovery strategies irrelevant since the threat is the public exposure of the data.
Harvest Now, Decrypt Later: In preparation for the arrival of powerful quantum computers, state-sponsored actors are stealing encrypted data now with the intent to decrypt it once quantum technology becomes widely available.
5. Growing Vulnerabilities in Emerging Tech
Cloud & Virtualization: Attackers are increasingly targeting virtualization infrastructure and misconfigured cloud-native environments to gain high-level administrative access.
OT and IT Convergence: As critical infrastructure and manufacturing (OT) merge with corporate networks (IT), attackers are finding new ways to steal proprietary data from factory floors and disrupt physical production lines.
Its called Cyber CrImes in texas its always the (Cartel MCs Mafia and Gangs) #Texas 🇺🇸 hot cell phone battery and funny effects or up load times #DataTheft
Data theft is the unauthorized copying, transfer, or storage of personal, confidential, or financial information, often for financial gain or disruption, through cyberattacks (like phishing, malware) or insider actions, leading to serious privacy breaches and financial losses, requiring strong security like MFA and strong passwords for prevention. What is Stolen? Personally Identifiable Information (PII): Names, SSNs, addresses for identity theft. Financial Data: Credit card numbers, bank details for fraud. Login Credentials: Usernames and passwords to access other accounts. Intellectual Property: Trade secrets, algorithms, software code. Health Information (PHI): Medical records for fraud or blackmail. Common Methods & Causes: Cyberattacks: Phishing, malware, exploiting system vulnerabilities. Insider Threats: Employees copying data before leaving or misusing access. Poor Security: Weak passwords, unpatched software, unsecured devices (USB drives). Ransomware: Increasingly, attackers steal data and threaten to release it (extortion) rather than just encrypting it. Signs of Data Theft (for individuals): Unexplained bank withdrawals or unfamiliar credit card charges. Not receiving bills or mail. Unexpected calls from debt collectors. New, unfamiliar files or pop-ups on your device. How to Protect Yourself & Organizations: Use strong, unique passwords & Multi-Factor Authentication (MFA). Be wary of unsolicited emails (phishing) and suspicious links. Keep software updated. Control device usage (limit USBs). Monitor accounts and credit reports. Implement security policies like least privilege for employees. What to Do If You’re a Victim: Contact your bank and credit card companies. Report identity theft to IdentityTheft.gov. File a police report. Contact the FTC (Federal Trade Commission).
David Michael Ramsey – Facebook @surfman374 – Instagram YouTube David Ramsey – LinkedIn
rigsreefclassicspearfishing.com
Data theft (or information theft) is
the unauthorized transfer, storage, or copying of personal, financial, or confidential information from a computer or network. Unlike physical theft, the original data is often not “removed” but rather duplicated for malicious use, such as identity fraud, extortion, or corporate espionage.
Common Methods of Data Theft
Social Engineering: Phishing remains the most prevalent method, where attackers use deceptive emails or texts to trick users into revealing credentials.
Malware: Programs like keyloggers, spyware, and ransomware are installed to monitor activity or lock data until a ransom is paid.
Insider Threats: Disgruntled or negligent employees may intentionally steal proprietary information or accidentally expose it via unsecured devices.
Technical Vulnerabilities: Exploiting unpatched software, weak passwords, or misconfigured cloud storage allows hackers to gain entry.
Physical Theft: Stealing hardware like laptops, smartphones, or unencrypted USB drives.
Targeted Information
Personally Identifiable Information (PII): Names, Social Security numbers (SSNs), and addresses used for identity theft.
Financial Data: Credit/debit card numbers and bank account details for unauthorized transactions.
Intellectual Property: Trade secrets, software code, and proprietary algorithms used for competitive advantage.
Credentials: Usernames and passwords that provide access to other secure accounts.
Steps for Victims (Personal)
If you suspect your data has been stolen, the Federal Trade Commission (FTC) and IRS recommend these immediate actions:
Report to Authorities: File a report at the FTC Identity Theft Portal to create a recovery plan.
Freeze Your Credit: Contact the three major bureaus—Equifax, Experian, and TransUnion—to place a credit freeze or fraud alert.
Secure Accounts: Change passwords and enable Multi-Factor Authentication (MFA) on all sensitive accounts.
Notify Financial Institutions: Alert your bank or credit card issuer to cancel compromised cards and dispute fraudulent charges.
Monitor for Tax Fraud: If your SSN was stolen, file your taxes early to prevent scammers from claiming your refund and consider an IRS Identity Protection PIN.
Steps for Organizations
Businesses experiencing a breach must follow legal and operational protocols:
Contain the Breach: Take affected systems offline immediately to stop further exfiltration, but do not turn them off before forensic experts arrive.
Notify Parties: Comply with state and federal laws (such as GDPR or CCPA) to notify affected individuals, law enforcement (FBI/IC3), and relevant regulatory bodies.
Audit and Patch: Identify the entry point, patch vulnerabilities, and reset all credentials for authorized users.
Report via IC3: Submit a formal complaint at the Internet Crime Complaint Center.
Have you seen any of my property it All got stolen from me
They stole my identity’s 4-21-2022 to present date and all my books I hand wrote about where I found my gold and how I saved 100,000 souls
Have you seen my stuff? David Michael Ramsey missing an #AftasGoldMedal #Texas and my Sword and ShadowBox Guns, Gold, Walrus Tusk …. #DMR #The374thSurfmanUSCoastGuard @surfman374 Instagram account is my personal account nothing for sale on it …
rigsreefclassicspearfishing.com
Is my website I built and my blogs I create daily
David M Ramsey 503-298-0592 blacknbluepb@yahoo.com
Bunch of bullshit 101lbs Poof Gone … took me from 1998-present date And they stole my #MineLabExcallibure
Gold surged past the $4,700 it was 3-$400an ounce when i first started out 1998 spot mark now 10x that for the first time Tuesday, and silver hovered just below a fresh record high, as global tensions sparked yet another rush to safety. Rigsreefclassicspearfishing.com #TripleDigitHunter stood for it just like #DMR is my initials and (DoMoreRight) #StolenGold #StolenIvory #StolenGuns #StoleNSperm #StolenIdentity #StolenMilitaryCareer #StoleMyLifestyle everything #StoleBoatAndMotor #StoleMapsICreated #StoleNBook stole my energy equipment my offshore gear tactical gear all my setup for mining prospects to do what I love including my tundra and Tacoma hacked vandalism everything
Spend your best 20 years of your lives protecting America and saving 30,000-100,000 lives arctic rescue surf rescue and hurricane rescues defend Americas coast lines protect Americas fisheries enforcing all federal laws and treaties and they smoke ya when you retire teach 1000’s of Coasties to fire handguns long guns machine guns m240bravo’s offshore onshore protect texas from mexicos & central / South America global illegal harvesting of fish gun running drug running human trafficking cyber attacks protect fisheries on westcoast ensure public are safe on the water build 100’s of homes for women men children in need and I end up homeless everything lost stolen cheater liars thieves suck! 100% combat related permanent disability from doing my job! And I get shit on loose 3 homes have my vehicles tundra Tacoma broke into flat tires homes vandalized vehicles trashed all my outdoor life style gear stolen everything I owned gonne heck yeah it sucks… @surfman374 #rigsreefclassicspearfishing #saltysoultaxidermy #spearfishingtalk
I’m not a terrorist, not a drunk, not a drug addict never cheated never abused yes at times my mouth was hard to handle but two sides too everything BTW mind you I pay $2200 child support can see my children cried there whole life because I still haven’t been able too… was hard enough standing duty missing holidays birthdays vacations even harder when they steal everything you did to prepare for retirement … we pay the bills the whole time were married they run off with everything … yeah it sucks sure it’s awesome when your spouse works the times they did it helped but millions agree military pay ain’t the best till you get rank glad I retired Chief 2018 sad it wasn’t master chief with 30 years when ya loose half your TSP in divorce and someone steals your identity all your guns and equipment to work #saltysoultaxidermy #gatorgrippdotcom it really sucks! Tattoo artist taxidermy 100ton MMD government construction project manager SCIF San Antonio Microsoft loose all my commercial grade meat production equipment and camera equipment advanced outdoor film and production loose my bows gold prospecting equipment sucks! When people destroy what you had for 20-30 years sucks! Have ivory stolen sucks now all I have left is clothes and air mattress construction equipment stolen sucks tools sucks power equipment sucks yeti coolers ain’t cheap I owned 4 2-250, and 2 almost as big were talking shit loads stolen all because people attacked me people fucked my shit up stole from me. Trust me the real story is hell! Boat and motor all my taxidermy everything gone my entire life poof … BMCRamsey Surfman374 David Michael Ramsey (503)298-0592