Sunday, February 15, 2026

Dancing with your FADD (Fusing Algorithmic Digital Doppelganger)

Clker.com






If you teach, there are now at least two versions of you. There’s the one who walks into a classroom, answers email, worries about students and family—and the one who lives on server farms: HR files, benefits accounts, LMS logs, immigration records, social‑media traces, shopping history, phone metadata, and the AI systems quietly stitching it all together into a profile that speaks for you in absentia.  

In a digital context, a doppelganger is an algorithmically generated “other self” – a data‑driven double that closely replicates a person’s identity, behavior, or appearance in virtual or computational space. There is also a vaguely mysterious, sometimes “ghostly” aura about the doppelganger, which is not far from how our current data doubles work in large‑scale surveillance systems. 

We have reached a point where those two versions—the flesh‑and‑blood you and your data double—are no longer separable. Our “inner” psychological identity and our “outer” digital, institutional identity are fusing into something new. If you teach, advise, or do academic work today, your opportunities, risks, and reputation are increasingly controlled, or at least heavily shaped, by this fused, post‑digital self

In this post I call that fused, post‑digital identity your FADD—your Fusing Algorithmic Digital Doppelganger.  

Three ideas help frame what is happening  

1. Data double  

Surveillance and digital‑identity researchers talk about your “data double” (sometimes “digital twin” or “digital doppelganger”). This is the dense, constantly updated profile built from your digital traces: payroll and taxes, banking and purchases, LMS activity, travel and device location, social‑media behavior, search history, and more. Institutions use that data doubles to make decisions about you—credit, insurance, hiring, travel, even “trust” or “risk”—usually without you ever seeing the profile itself. 

2. Extended self in the digital age  

Marketing and consumer‑culture researchers have long written about the “extended self,” the idea that parts of who we are reside outside our bodies—in our possessions, technologies, and archives. In the digital age, that means our phones, cloud storage, feeds, and chat histories have become extensions of memory, agency, and self‑presentation. When your calendar, notes, photos, chats, and documents are all online, erasing them would feel almost like erasing parts of you. 

3. Post‑digital identity  

Education and media theorists describe a “post‑digital” condition: the digital is no longer a separate realm but the basic fabric of everyday life. In that context, identity is post‑digital from the start; it does not begin offline and then get uploaded later. Our sense of self is formed from the beginning in environments where algorithms, platforms, and dataflows are taken for granted. 

Taken together, these ideas point to a fused, post‑digital self and identity: a person whose inner life, social presence, and data double are constantly representing one another and fusing rapidly. 

How this fusion shows up in the lives of educators  

Your FADD is unusually rich and unusually exposed.  

Consider:  

  • Employment and HR systems. Your contracts, evaluations, sick days, pension contributions, and payroll run through tightly integrated platforms. Those systems often connect to background checks, credit bureaus, and government databases. A small error or a malicious change in one place can cascade into visa problems, benefits denials, or frozen pay.  
  • Learning management and assessment systems. Your teaching “identity” is increasingly defined by LMS logs: how quickly you grade, how often you post, how “responsive” you appear in the analytics. Students’ complaints, click‑paths, and course completion rates can feed into institutional dashboards that silently rank courses and instructors. You may still think of yourself as “the kind of teacher who…,” but the institution increasingly thinks of you as a pattern in its data.  
  • Immigration, travel, and cross‑border work. For those who teach on visas, cross borders for conferences, or work in multiple countries, the data double spans states and regimes. Immigration systems, tax authorities, and security agencies link records in ways that are mostly invisible, but very real in their consequences. In some countries, AI‑driven scoring of individuals is already an explicit tool of governance; in others, it is emerging quietly inside “risk‑management” systems. 
  • Social media and professional reputation. Facebook, X, LinkedIn, and even messaging apps become part of your professional identity, whether you intend them to or not. A single out‑of‑context post or a cloned account using your name and photo can reach administrators, students, and collaborators long before you have a chance to respond. Here your visible extended self and your hidden data double collide: what people see and what algorithms infer bleed into one another. You still experience yourself as “one person,” but in practice, many different copies and versions of you are circulating and being acted upon all the time.  

New vulnerabilities

Once you see identity this way, the risks look different.  

  • Misclassification and scoring. AI systems are increasingly used to infer things about individuals from their data doubles: creditworthiness, employability, “engagement,” even mental‑health risk. These inferences can quietly limit your opportunities, raise your costs, or flag you as a problem—without you ever seeing the label. 

  • Cascading effects. Because so many systems are linked, a single successful fraud or bureaucratic error can spread. A compromised account may lead to fraudulent loan applications, forged tax returns, benefits theft, or visa violations in your name. From the system’s point of view, it is still “you,” because it is acting on your data double.
  • Psychological impact. When reputational hits and administrative decisions are triggered by data you cannot see or control, it is easy to feel both exposed and strangely erased. You are accountable for things done in your name—but you have limited access to how that name is being used.  

In other words: the threat surface is no longer just your credit file or inbox. The threat‑vulnerable interface is your fused, post‑digital self—your FADD.  

From “privacy” to stewardship of your FADD  

So what does it mean to live responsibly and safely as this fused self, especially as an educator? A few shifts in mindset can help:  

  • From secrecy to selectivity. Old‑style privacy focused on keeping information secret. In a post‑digital environment, some forms of disclosure are simply non‑negotiable if you want to work, teach, travel, or bank. The question becomes: What do I choose to share, with whom, through which channels, and under what conditions? [arxiv](https://arxiv.org/pdf/2509.12383.pdf)

  • From one‑time decisions to ongoing hygiene. Identity protection is no longer a “set‑and‑forget” password choice; it is closer to dental care. Regular checks of your accounts and statements, watching for unfamiliar logins or addresses, updating security settings, and freezing or thawing access to sensitive data when needed all become routine.  
  • From isolated incidents to systemic patterns. A weird charge on a card used to be “just” fraud. Now it might be the first visible symptom of a broader exploitation of your data double: fake unemployment claims, fraudulent tax refunds, synthetic identities built partly from your records. When something small goes wrong, assume it might connect to a larger pattern
  • From lone vigilance to professional backup. There is a limit to how much a single educator, already overloaded with teaching and life, can monitor and contest on their own. This is where specialized monitoring, restoration, and legal‑support services come in—not just as “credit monitoring,” but as allies in defending your extended, post‑digital identity. [arxiv](https://arxiv.org/pdf/2509.12383.pdf)

My own bias is that identity‑monitoring and legal‑assistance plans are no longer optional extras for professionals who live so much of their lives online. They offer two things most individuals do not have on their own:  

1. Continuous, system‑level visibility into your data double across many databases, and  

2. Experts who can help restore and defend your identity when something goes wrong, rather than leaving you to navigate a maze of institutions alone.

An invitation to guard your FADD  

If you are reading this as an educator, ESL professional, or academic, you already know that your work identity and personal identity have blurred. Your courses follow you into your living room, your students find you on social media, your HR data is somewhere in the cloud, and your passport and pension are linked to systems you will never see. In that environment, one of the most important things you can do is to start thinking of yourself as more than a single, private “me.”  

You are also a data double, an extended self, a post‑digital person—someone whose value and vulnerability are increasingly tied to what lives in databases and models. You cannot opt out of that completely. But you can take it seriously enough to: 

  • Become more intentional about what you share and where.  
  • Build regular identity‑hygiene habits into your week.  
  • Put in place services that watch over your data double and stand beside you if (or when) it is misused. 

That is the larger frame within which I now understand tools like IDShield. This is not just about “protecting your credit,” but about protecting your fused, post‑digital self—your FADD—so that the person you know yourself to be, and the person the systems say you are, stay as closely aligned, and as secure, as necessary. 

If you would like to explore what that kind of protection could look like in your situation as an educator or former student, feel free to reach out; I am happy to help you think through how best to live with your FADD: wracton@gmail.com or on LinkedIn (https://www.linkedin.com/bill-acton) 

*Side note: There is already a very different FADD acronym, the so‑called “death gene.” In molecular biology, FADD is a protein with domains that play a key role in tumor growth and destruction. The coincidence of acronyms is a bit eerie—but perhaps not entirely inappropriate. (I might recommend playing  Franz Liszt’s solo‑piano transcription of Schubert’s Lied “Der Doppelgänger” as accompaniment!) 

Note: This post was drafted with help from an AI assistant, Perplexity.AI, and edited by a very human 82‑year‑old who has no intention of becoming a next victim. (wracton@gmail.com)  


Friday, February 13, 2026

My chiropractor's brilliant analogical endorsement of (web-based) Identity protection by professionals!

 I have been at war with gravity for the last 30 years or so, constantly pounding away at every joint in my spine hips and legs on every run. Now over 80, I still run about 20 miles a week, but I can only keep going by dropping in on my neighborhood chiropractor once a month or so to get a few spots untangled and loosened up. Nothing I can really do myself now, after all the years of broken, strained, ripped and contused key moving parts. 

Today, after another amazing session, I remarked to him that I have given up on trying to keep it all functioning well enough to be competitive myself. He turned to me, laughed and said, he didn't know any professional like himself who is very active like me, who would ever try to "do it himself," either. He has a colleague who reciprocates, keeping him aligned and in balance in exchange for doing the same for him regularly.

 When you get to or strive for optimal functioning, or . .. running, you need a professional with you, a coach or . . . chiropractor! 

Got that? The same applies today when it comes to protecting yourself and family from AI-generated deep fakes and scams. I don't have the time or expertise to manage my identity adequately online anymore, and you probably don't either  -- something far more eomplex than just keeping me running, literally or figuratively. And it is affordable. 

Get on this immediately, my friend. I'm with one of the most well established and best, IDShield, but be happy to point you at a better fit for you, personally, from the other top systems on the market, if necessary. 

Bill

wracton@gmail.com                                  www.williamacton.legalshieldassociate.com


Here are links to a few recent blogposts I've been doing that lay out the basics and  data on where we are today:

AI Deep Fakes: Is that really you, Mom? (and how to counter them!)


An AI Scam Wiped Out Her Retirement at 82. How Safe Are You?


20 reasons that I invite educators to join me with Legalshield!


20 reasons that you should subscribe to Legalshield!


Responding to the inevitability of universal, global digital IDs


No Fear! (or AI PHOBIA! ) Thumbnail sketches of seven worldview's ways of coping


AI's (Perplexity) Guides to dealing with AI-enhanced fraud and scams: General, Christian, Muslim, Atheist/secular humanist, "Senior Citizen," and Japanese Buddhist/Shinto approaches



Clker,com


The Hell-O Here After AI Jimmy Buffett Talking Blues

A-Crock: The Replika AI Companion Chat Bot Talkin’ Blues


An ambivalent octogenarian take: The talkin' good mornin' AI chat bot blues!


Loverly AI Ambivalence Waltz lyrics





Loverly AI Ambivalence Waltz lyrics

 Loverly AI Ambivalence Waltz


(with apologies to Johann Strauss)

O loverly AI (x2)
Much wiser than I (x2)
Some things you can do (x2)
I really eschew (x2)
Like the way that you think (x2)
Might cause one to drink (x2)
In seconds . . . on the spot
Any question I got 
answered quick as a wink, 
thanks a lot!

O loverly Ai (x2)
Please tell us why (x2)
You’ve never drunk a beer (x2)
Or hunted a deer? (x2)
You don’t have a barn (x2)
On your server farm (x2)
But still you advise 
us girls and us guys 
With Algorithmically little white lies. 

O loverly Ai (x2)
We await your reply (x2)
Is there something amiss (x2)
Like your lover’s first kiss (x2)
Or holding her hand (x2)
Being part of the band (x2)
Or Starbucks ambiance 
A Texas line dance
Or the feeling of ants in the pants?

O loverly AI (x2)
Was it pie in the sky (x2)
Or chateaubriand (x2)
Or something beyond (x2)
Like a burger and fries (x2)
That dazzled our eyes (x2)
To love sharing with you . . .
Everything that we do . . .   
But it hurts to say, AI, we’re through

Goodbye, adios, adieu
Proshchai, au revoir, toodle do!
But y’all come back now . . . 
real soon!




Acton©2026

EAPIC Lesson 1: Rhythm and FALL/RISE Sign-offs

 English Accent and Pronunciation Improvement Course (EAPIC)

Haptic - using gesture and touch

KINETIK – using the whole body to learn

Link to the Introduction video!

***

Link to Lesson 1 Training video


Lesson 1 – Rhythm and FALL/RISE Sign-offs

  • MT5 (movement, tone, touch and tempo) Technique
  • MT5 video uploaded every Week on Youtube.
  • (Optional) Zoom class meeting on Wednesday at 8 EST.

Homework: 

Do at least the 20-minute practice every morning for 5 days. 


Warm up (3x each)

1. Neck stretch (left side, right side, back, front)

2. Upper chest and shoulders (elbows touch) 

3. Nasal resonance (Ying! Yang! Young!) 

4. Back (‘Oh’ cone) and chest (Ooo-Wah!) 


Syllable Butterfly Training

Strong tap on the stressed syllable on right shoulder: X

Light tap on unstressed syllables on left forearm: o

 

Cool. X

That’s cool. oX

Really cool. ooX

That’s really cool. oooX

Awesome Xo

That’s awesome. oXo

Really awesome. ooXo

That’s really awesome. oooXo

Super cool. Xoo

That’s super cool. oXoo

Really super cool. ooXoo

That’s really super cool. oooXoo

Super awesome. Xooo

That’s super awesome. oXooo

Really super awesome. ooXooo

That’s really super awesome oooXooo


FALL/RISE Sign-offs: 

FALLing tone (  \ ) Usually at the end of a statement or certainty. Nice to meet you. \

RISEing tone ( / ) Usually at the end of a question or uncertainty. Are you coming? /

Lesson I – Embodied Oral Reading (EOR)

(Syllable Butterfly + FALL/Rise Sign-offs)


1A:  I THINK | we've GOT it | figured OUT.    

           •X                     •X•                    • •X    \

   B: Oh. Can you TELL me | what it IS? 

         X                      X   •              • •X   /

2A: Your MUFfler | I THINK | has a small HOLE in it.    

 •    X•                 •X                   • • •      X      • •    \

   B: Oh NO!  Does it NEED | to be rePLACED right now?   

          • X             • •     X            • •      • X                 •    •   /

3A: Yes, it DOES. It ISN’T going to | last much LONger     

        X    •  X         •   X•        •   •             • •           X•.  \

   B: Huh. How MUCH | will it COST?         

          X            • X            •  •        X   \

4A: A-BOUT | a hundred | and fifty DOLlars.        

          •X           •     X•          •     • •       X•    \

   B: Really. That's too BAD. Is there a less exPENsive way?       

          X•               ••     X                      • • • • •X    •        •   /

5A: You could MAYbe | rePAIR it, yourSELF.

             • •       X•               •X     •         • X    \

   B: How LONG | exACTly | will that LAST?

            •  X                 •X•                 • •     X   \

6A: If it works at ALL . . . MAYbe | for a couple of MONTHS?

               • • •   •   X             X•            • •     • •       •   X    /

   B: I'll DO that. SEE you | in a MONTH or two!

          •  X   •        X   •            • •     X         • •    \


Homework: 

1. Take notes!!!

2. Practice every day, in the morning, standing, with good gesture, using pleasing (beautiful) voice and volume. (Warm up, training and EOR)

3.  Check out: https://elsaspeak.com/en/ (vowels and consonants)

4.  Check out:https://speechling.com/ (general speech fluency)


Email me: wracton@gmail.com with questions or to enroll for EAPIC course feedback sessions: ($250 USD)




Wednesday, February 11, 2026

EAPIC (English Accent and Pronunciation Improvement Course) Open Info Meet Tonight!

 The live EAPIC Google Meets session is from 8 to 9 EST tonight. It is a follow up to last week's video of the course introduction. ( View that here!) The lesson One training video will be uploaded tomorrow. 

Each week on Wednesday there is a live feedback session for students who are enrolled in the course. Tonight's session is free, pretty much just a Q&A and scheduling of individual interviews. Those 15 minute interviews are just to see if the course is for you. Ideally you should have an IELTS 5+ or equivalent and have the time, 30-minutes a day, for the homework. 

See you tonight. 



AI Deep Fakes: Is that really you, Mom? (and how to counter them!)

Clker.com




Deepfakes, scams, and your identity: what protection services really do

It’s getting harder and harder to tell what’s real online. One minute, you’re scrolling through social media; the next, you see a video of someone who looks exactly like your favorite celebrity — or worse, like you. AI “deepfakes” are realistic videos or audio created with artificial intelligence to make people appear to say or do things they never actually did.

These deepfakes can look frighteningly real, and scammers are already using them in dangerous ways — from impersonating company leaders to trick employees into wiring money, to copying a family member’s voice to demand “urgent” help. While no consumer service can stop someone from fabricating a video of you in the first place, there are tools that help you catch, contain, and recover from this kind of abuse.

What deepfakes are and why they matter

Think of a deepfake as a high‑tech disguise. AI tools can learn your face, gestures, and voice from photos, video clips, or audio online, then generate new media that looks and sounds convincing — sometimes even to trained professionals.

Cybercriminals are using these tools to manipulate people by:

  • Pretending to be your boss to request money or sensitive information.
  • Posing as relatives or friends asking for emergency funds.
  • Creating fake videos to damage reputations, influence opinions, or spread misinformation.

That’s why protecting your identity today isn’t just about strong passwords or antivirus software — it’s also about monitoring how your personal information and online identity are being used, and having professional help if something goes wrong. idshield+1

What identity protection services actually do

Most identity protection services do not “block” deepfakes or prevent someone from creating one of you. Instead, they focus on:

  • Monitoring your personal data: Watching for signs your information is being misused, such as suspicious accounts, transactions, or data appearing on the dark web. safehome+3[youtube]\
  • Sending alerts: Notifying you quickly when your information or accounts show signs of fraud, so you can act fast. safehome+3
  • Helping with restoration: Providing specialists who help you clean up the damage, dispute fraudulent accounts, and restore your identity, often backed by insurance coverage. comerica+3

Some services also include device and network tools (like VPNs, antivirus, or anti‑tracking) that reduce the chances of your data being stolen in the first place, but they still can’t reach into social media or private chats and “turn off” a deepfake. security+1

Where IDShield fits in (and how others compare)

IDShield is one example of this kind of service. It focuses on proactive monitoring across multiple areas of your life (financial accounts, social media, dark web, and more), real‑time alerts, and hands‑on help from licensed investigators if fraud occurs. That support can be crucial if, for example, a deepfake is used as part of a broader identity fraud scheme or scam. idshield+3

Other companies — such as Aura, LifeLock (often bundled with Norton), Identity Guard, IdentityForce, and IdentityIQ — offer similar combinations of monitoring, alerts, and restoration support, sometimes with different mixes of credit monitoring, insurance limits, device protection, and online privacy tools. The right choice for you depends less on the brand name and more on: aura+5

  • What they monitor (credit bureaus, bank accounts, dark web, social media, etc.).
  • How fast and detailed their alerts are.
  • The quality of their restoration help and how much coverage they provide if you become a victim.

Whichever service you choose, it’s more accurate to think of it as a safety net and response team for identity‑related fallout from scams and deepfakes, not as a shield that prevents bad actors from ever creating a fake of you.

Practical steps you can take

Even with a good identity protection service, your own habits still matter. To reduce the risk and impact of deepfake‑driven scams:

  • Be cautious with urgent requests, especially involving money or sensitive information — even if they appear to come from someone you know.
  • Use a “call back on a known number” rule: If you get a suspicious video or voice message, verify through a separate channel before acting.
  • Limit what you share publicly (videos, voice notes, personal details), since this is the raw material deepfake tools learn from.
  • Consider an identity protection service as part of your overall strategy, so if someone does misuse your identity, you’re not handling it alone. idshield+5

Why IDShield? 


IDShield treats AI fraud as an identity problem, not just a tech problem
  • AI scams usually succeed by stealing or misusing your identity (accounts, credentials, SSN, images, voice), not just by tricking your device. idshield+3

  • IDShield is built around ongoing identity monitoring, alerts, and restoration—not just antivirus—so it’s aligned with how AI fraud actually hurts real people in 2026. idshield+4


Continuous monitoring for AI‑driven misuse of your data
  • IDShield watches credit, financial accounts, dark web markets, public records, and more for suspicious use of your information that may come from AI‑powered scams or data leaks. geekwire+5

  • As AI makes fraud faster and more automated, this “always‑on” monitoring helps catch problems early—before they snowball into full‑blown identity theft. yardleywealth+4


Fast alerts and real humans when something looks wrong
  • IDShield sends near‑real‑time alerts when it detects signs of fraud, giving you a chance to respond before bigger damage occurs. idshield+4

  • Unlike purely automated tools, IDShield backs you with licensed private investigators who will actually do the restoration work on your behalf, not just give you a checklist. cnet+3


Full‑scale restoration in an era of complex AI fraud
  • If an AI‑enabled scam leads to account takeovers, fraudulent loans, or synthetic identities built using your data, IDShield’s investigators work to restore your identity to pre‑theft status. idshield+3

  • Plans include substantial identity theft insurance (up to around the multimillion‑dollar range) to help cover certain out‑of‑pocket costs tied to recovery. geekwire+1


Education and coaching for deepfakes and AI scams
  • IDShield produces up‑to‑date guidance on emerging AI scams, deepfake risks, and practical red‑flag training so members know what to look for before they click, answer, or wire money. idshield+4

  • In a world where deepfake detection tech alone is unreliable, informed behavior plus monitoring and restoration support is one of the strongest defenses. vectra+3


Honest positioning vs. “magic shield” claims
  • No consumer service can stop a scammer from creating a deepfake of you, but IDShield can help you detect resulting fraud faster and repair the damage with expert help. idshield+4

  • The real value in 2026 is having a proactive identity safety net—monitoring, alerts, education, and hands‑on restoration—rather than a promise to “block” AI outright. yardleywealth+

Note: This post was drafted with help from an AI assistant — and edited by a very human 82‑year‑old who has no intention of becoming the next victim. (wracton@gmail.com)



Sunday, February 8, 2026

An AI Scam Wiped Out Her Retirement at 82. How Safe Are You?

At 82 myself, this story hit me hard. An 82‑year‑old grandmother lost nearly $200,000—not to a cartoonish prince in Nigeria, but to a popular “doctor” she thought she’d been seeing live on social media. Scammers used AI to create an utterly convincing deepfake video of the soft-spoken physician, complete with compassionate face and voice. It persuaded her to move her investments into “safer,” more profitable accounts . . . 

The “doctor” never existed. AI stitched together a compassionate face, a soothing voice, and a believable story—just for her

AI has radically changed the game. It can now clone trusted voices and faces, fabricate experts and news clips, and generate flawless bank style emails and social media posts tailored to your age, profession, interests, and financial profile. For those of us in education—often on part time or year to year contracts, already navigating fluctuating incomes—one well crafted AI powered scam can spell disaster. 

A second example: The message that cost Lena her retirement savings didn’t sound foreign, clumsy, or obviously fake. It looked exactly like the security alerts she had been getting from her bank for years—down to the logo, the subject line, and the urgent but polite tone.

Lena is 52, a senior project manager who spends her days reading contracts and risk reports. She is not naĂŻve, and she is technologically savvy. Yet over three weeks, guided by a smooth, AI‑polished voice that claimed to be “from the bank’s fraud department,” she moved almost her entire retirement savings into what turned out to be ghost accounts.

How AI changes the scam game

AI makes messages and websites look and sound professional, eliminating many of the red flags (bad spelling, odd phrasing) we were trained to notice in older scams.
AI voice tools and deepfakes allow scammers to mimic the tone and cadence of bank staff, government agents, or even relatives, making phone-based social engineering far more convincing.
AI driven scripts help scammers respond quickly and confidently to hesitation, giving victims the sense they’re talking to a well trained professional following a real protocol.

The real question isn’t, “Can I afford protection?”  It is: “Can I afford a major financial hit with little or no backup?”

Three basic rules I now live by:
  • I never act on a financial request from a message alone; I always verify through an official channel.
  • I slow down anything labeled “urgent.”
  • I keep a professional safety net in place for identity monitoring and legal/financial guidance.
How many of those three are you actually doing right now—honestly?

Try this: 
– “I think I’d spot this kind of scam because…”
– or “I’m not sure I would, and here’s why…”

If you’d like a simple one‑page checklist on scams—AI and otherwise—that target educators and retirees (plus a few options for protection), email me at wracton@gmail.com. One of the options I mention is the company I’m with, LegalShield!

Note: The 82‑year‑old “deepfake doctor” story was reported by SWNS and then by several other outlets. Whatever the tabloid gloss, it matches what law enforcement and aging‑advocacy groups are now warning about AI‑driven scams.

This post was drafted with help from an AI assistant—and edited by a very human 82‑year‑old who does not want to be the next victim.




Friday, February 6, 2026

The Hell-O Here After AI Jimmy Buffett Talking Blues

Here After AI allows you to talk with those you love  . . . from the "After life," so to speak! Just imagine if Jimmy Buffett had signed up before he signed out recently! Another in my continuing series of talkin' blues on why I love AI. . .so much . . 

Link to the song on Vimeo


Woke up from a power nap  . . .  much to my surprise

There was Jimmy Buffett right before my eyes

Laughin’ and greetin’ me on my laptop screen

First I figured it was just a dream

But no, down there in the corner

Was a congrats from Hereafter AI

For signin’ up for the Eternal Here after AI Life plan . . . 


So, how are you doin’ I said to him

He said, perfect, I could call him, Jim

He looked great for a guy so old as me

He said he chose 33

Best years of his life

Wine, women, song

The good after life . . . 


We talked for hours and hours that call

Time didn’t seem to pass by at all

Every dream he’d had comin’ true

Said I could do the same thing, too

With Here After AI

No pain, no gain, just all good

Whatever you can imagine


So, We watched together like his biggest fans

Accompanied by the Coral Reefer band 

Didn’t last too long, though, nothin’ new to say

Just his stories and songs, day after day

Eternal Here After AI

Mind without body, spirit without soul

From Jimmy Buffett’s HELL -O!


So, if there’s a message in this song

You got me, I’m just singin’ along

Or where the lyrics are from as well

Maybe Margaritaville  . . . 

Eternal AI, hereafter

Nothing but pickin’ and a-grinnin’

Hell-O from the other side   . . .  Jimmy Buffett and me . . . 

Clker.com





For an at least partial antidote to the AI invasion and takeover, for legal backup and identity protection, goto: williamacton.legalshieldassociate.com or email me directly: wracton@gmail,com. 


Thursday, February 5, 2026

English Accent and Pronunciation Improvement Course (EAPIC) Introduction

Here is the link to the video (Youtube)

(Note: The video quality of the text on the screen is a little fuzzy, but it is the same as what is below! Also, my voice with the cold is a little fuzzy, too! ) 

Better accent or pronunciation

Better expressiveness in speaking

More confidence in speaking

Good method for continuing to improve - Study at home, by yourself!

Works for anybody with a CLB or IELTS 5 and up

10 weeks, online (plus Introduction)

(Free) 20~30-minute training video uploaded to YouTube every Thursday

15~30 minutes of homework every day!

(Optional) live homework follow up meeting on Zoom Wednesday at 8-9 p.m. EST. 15-minute Zoom interview required to enroll ($250 USD additional fee)

Weekly syllabus:
1. Basic rhythm 1 (pronunciation grammar) 
2. Fluency 1 (body rhythm)
3. Consonants 1 (common problems, such as 'th' and 'r/l')
4. Vowels 1 (short)
5. Vowels 2 (long)
6. Consonants 2 (students’ “favorite” problems)
7. Melody 1 (little pieces, phrases)
8. Melody 2 (longer pieces, sentences)
9. Fluency 2 (Public speaking and classroom stye)
10. Rhythm 2 (Conversation style)

Typical weekly schedule: 

   Thursday: Do the video along with me (20+ minutes) and keep notes!

   Friday: Do the warm up, training, embodied oral reading (EOR) and keep notes!

   Saturday: Do the warm up, training, EOR and keep notes!
              Notes: Other words or phrases you have difficulty pronouncing well

   Sunday: Take the day off with me!

   Monday: Do the warm up, EOR, practice your target words (with MT5s) and keep notes!

   Tuesday: Do the warm up, EOR,  a new one-page story you have found with MT5s, 
                   practice your target words and keep notes!

   Wednesday: Come to the live feedback 60-minute class on Zoom (or practice by yourself!) 

       Here is what goes on in the feedback session: 
                       a. Go over the EOR
                       b. Check students' individual MT5s for accuracy
                       c. Questions from and help with target words of students
                       d. Preview of the next week's lesson

So . . . How does this course work? 

Gesture and touch make pronunciation easier to learn and remember

Using your whole body (embodied) makes is easier to pay full attention

Rhythm and gesture together help keep learning both relaxed and energetic

Embodied oral reading is great for bringing what you study into conversation

Practicing the EOR every day trains your mind and body to move and speak more like English speakers do. 

Use what you know . . . 

Email me: wracton@gmail.com for more information or to enroll (via Paypal or Venmo). To enroll requires brief Zoom chat (just to make sure the course is for you!) 

For a more in depth discussion of the basis of the EAPIC course, go to: https://www.actonhaptic.com/eapic

The Summer 2026 EAPIC course is being revised to include identity protection. Students will also be using IDentityshield system. For a preview of IDentityshield go to: IDentityshield introduction, or  www.williamacton.legalshieldassociate.com 

Homework for next week 

A. Tell me a little about yourself and why you think this course would be helpful for you.

B. Give me some idea of your weekly schedule, how much time you have to practice!

C. Tell me about your experience with music, playing an instrument, etc., or just enjoying it!

D. Tell me if you'd like to join the Wednesday Zoom feedback class. (If so, I'll set up a Zoom interview just with you as soon as possible. If I do, what would be a good time for you?)

Keep in touch!

Bill









Monday, February 2, 2026

Happy (updated) Setsubun! "AI wa soto; fugu wa uchi!"

Today in Japan is the festival of Setsubun which celebrates the coming of spring. Having been in Japan for about ten Setsubun festivals, it just sort of grows on you, especially the little jingle that you repeat as you toss a few beans blessed by the priests at the Shrine into each room of the house and out every door and window:

            "Oni wa soto; fuku wa uchi!" (Roughly translated: Devil out; good fortune in!) 

Clker.com

Here is what I would propose as an updated version for today: 

              "AI wa soto; fugu wa uchi!" (AI OUT! Blowfish IN!)

Clker.com

Wonderful parallel, don't you think! As we get closer and closer to the tempting, delicious danger near the "ovaries" of AI, remember the blowfish . . . and not blow it! 

See previous blog post on at least one way of doing that!

Bill



Sunday, February 1, 2026

Embodied English Pronunciation and Identity Protection Course

Embodied English Pronunciation and Identity Protection Course (for nonnative speakers and their instructors) is a 12-week, practice-driven course that helps multilingual professionals and their instructors build clearer, more confident spoken English while learning to recognize and resist today’s AI enabled fraud and deepfake threats. It is designed for programs or individuals that want to strengthen students’ communicative impact and safeguard their digital and professional identities at the same time. [pronsig.iatefl+6] 

What this course does

Integrates haptic (movement  and touch based) pronunciation training so learners physically “map” stress, rhythm, and intonation, making clearer, more intelligible speech that transfers into real world communication. [jalt-publications+3]

Uses that same heightened awareness of voice, language patterns, and gesture to train students and instructors to detect persuasive language, suspicious vocal cues, and cultural “red flags” in scam calls and social engineering attempts. [hipoeces.blogspot+2]

Provides hands on practice with a comprehensive, web based identity protection platform (IDentityShield by LegalShield), so participants can see how technical safeguards and human judgment work together. [youtube]

Why this matters for educators

Deepfake audio and video are now realistic enough that even experienced professionals are being deceived by AI generated “colleagues” and executives in live video calls, resulting in multimillion dollar losses for institutions in places like Hong Kong or AI deep fakes such as Only Virtual, where you can communicate with the dead. Traditional awareness campaigns and generic fraud briefings are no longer sufficient; learners need repeated, language rich practice in spotting how fraudulent messages actually sound, look, and feel in interaction. [incode+5]

This course positions language educators as a first line of defense by turning everyday pronunciation work into a powerful lens on persuasion, credibility, and identity—skills that transfer directly to academic, workplace, and online contexts. [actonhaptic+4]

Structure and learning experience

12 week core program combining targeted pronunciation modules (vowels, stress, rhythm, intonation, fluency, key consonants) with parallel units on scam recognition and response. [wracton.wixsite+1]

Weekly Zoom feedback sessions for students that focus on intelligibility, professional identity, and real play practice with scam and deepfake scenarios. [wracton.wixsite]

Separate weekly Zoom sessions for instructors that model classroom techniques, debrief cases, and adapt materials to different proficiency levels and institutional needs. [pronsig.iatefl+3]

Throughout the course, learners repeatedly rehearse short, authentic style scripts—such as “urgent” calls from supposed supervisors or financial institutions—using haptic techniques to anchor both accurate pronunciation and a critical awareness of how persuasive attacks are constructed. [jalt-publications+3]

Outcomes for students and programs

By the end of the course, participants will be able to:

Speak with clearer, more consistent pronunciation and rhythm, improving comprehensibility in academic and professional settings. [actonhaptic+4]

Analyze and respond appropriately to suspicious calls, messages, and video interactions, drawing on linguistic, vocal, and cultural cues rather than relying solely on intuition or technology. [coverlink+4]

Use IDentityShield tools more effectively to monitor, document, and report potential identity fraud, integrating language skills with concrete protective actions.[youtube]

For institutions, adopting this course means adding a distinctive, future oriented offering that simultaneously advances core language outcomes and addresses a fast emerging area of digital risk that directly affects students, staff, and partner organizations. [getclarity+7]

EEPAIP Course will be available as described beginning May 2026. Most of the basic structure, less the IDentityshield components, is present in the current English Accent and Pronunciation Improvement course, beginning this week, on February 5th. 







Sources: 

1. https://pronsig.iatefl.org/wp-content/uploads/2020/11/Haptic-Pronunciation-Teaching-IATEFL-Webinar-FINAL.pdf       
2. https://incode.com/blog/25-million-deepfake-fraud-hong-kong/    
3. https://jalt-publications.org/sites/default/files/pdf-article/jalt2012-042.pdf         
4. https://coverlink.com/case-study/case-study-25-million-deepfake-scam/    
5. https://www.actonhaptic.com/about     
6. https://www.getclarity.ai/ai-deepfake-blog/25m-deepfake-ceo-scam-shakes-hong-kong-firm    
7. https://hipoeces.blogspot.com/p/hapticteaching-tips-a.html       
8. https://wracton.wixsite.com/acton-haptic        
9. https://www.youtube.com/watch?v=eu0lyPJmhE0  
10. https://www.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk 
11. https://www.trendmicro.com/en_us/research/24/b/deepfake-video-calls.html  
12. https://www.cnn.com/2024/05/16/tech/arup-deepfake-scam-loss-hong-kong-intl-hnk   
13. image.jpg 
14. https://hipoeces.blogspot.com 
15. https://www.youtube.com/watch?v=pwzrLUnrdLc 
16. https://www.facebook.com/SRteachingandlearning/videos/haptic-pronunciation-teachinghaptic-its-basically-using-more-gesture-in-teaching/2793189254227565/ 

For additional information on the course: wracton@gmail.com
See also www.williamacton.legalshieldassociate.com for specifics on IDshield system. 

DISCLAIMER: This course description was created with the assistance/collaboration of Perplexity AI.