Susye Weng-Reeder, a Google Verified internet personality, blogs about being locked out of her own email and social media accounts. With no human support from major platforms like Google, Facebook, or Instagram, she’s redirected to spoofed recovery pages and denied access to her identity. This image represents the emotional toll of being digitally silenced.

Locked Out and Looping: What Happens When Big Tech Won’t Help You Reclaim Your Identity

Disclaimer: The content of this post reflects my personal experience, observations, and opinions. Any mention of companies, platforms, or products is solely for the purpose of documenting my user experience and is not intended to make claims about their internal practices, policies, or intent. I acknowledge that these companies serve millions of users and that individual cases may vary. This post is not affiliated with or endorsed by any platform mentioned.

This series is meant to document a real experience that many creators and entrepreneurs now face — and to raise awareness of invisible threats in an increasingly digital world. It does not reflect my professional conduct or reliability, which remains rooted in strategy, systems thinking, and integrity.


Since April 2025, I’ve been fighting to reclaim my digital identity after an advanced impersonation and intrusion disrupted nearly every part of my online life — from devices and apps to the platforms and networks I trusted most.

In my first three posts, I shared how it began:

• Spoofed apps that mimicked the App Store

• A poisoned WiFi network that altered what I saw

• And an Apple ecosystem that started reacting to something I couldn’t yet name

But there’s another side no one prepares you for:

What happens when you lose access — and there’s no real person left to help you reclaim what’s yours?

I Reported the Fraud — But No One Was Listening

When unauthorized webpages and listings appeared using my brand name, SincerelySusye, I acted quickly.

These weren’t copycat accounts. These were:

• Webpages using my name, branding, and likeness

• Redirecting visitors to third-party lead capture forms

• Quietly siphoning off trust I had spent years building

Friends flagged them. Colleagues submitted reports. I reached out to contacts inside Google and Meta.

I filled out every form I could find.

But instead of support, I was met with:

• Automated replies

• Broken redirects

• Templated denials — with no way to reach a real person

Even with a professional background — including time at Facebook before it became Meta — I was given no path to verify myself or recover what had been taken.

“This Doesn’t Violate Our Standards”

One impersonator profile used my name, my photo, and my branding — yet after multiple reports from followers, the final verdict read:

“This doesn’t violate our community standards.”

That came after screenshots, documentation, and multiple reports from real users.

The impersonator stayed online.

And I — the real person — was locked out of my identity.

What If I Never Reached Real Support?

Around the same time, my network began showing signs of DNS hijacking — spoofed support pages that looked real, but weren’t.

Now I wonder:

Did some of my reports ever reach the actual platforms?

Or were they intercepted — becoming just another layer in the attack?

It’s the quietest kind of harm:

You think you’re asking for help — but your message never lands.

You believe you’re reclaiming your identity — but you may be unknowingly feeding the very system stealing it.

They Didn’t Pretend to Be Me — They Built Around Me

This wasn’t impersonation in the way most people understand it.

No one was posting as me.

No one was sending messages in my name.

Instead, they built infrastructure around me — digital traps designed to collect interest, capture leads, and reroute trust.

I discovered:

• “SincerelySusye” contact pages I didn’t create

• SEO-targeted funnels built off my brand

• Landing pages designed to harvest inquiries

Even Google Maps Was Compromised

Eventually, my name appeared in Google Maps results — tied to listings I never made.

These entries:

• Used my business title

• Linked to spoofed or third-party sites

• Appeared “unclaimed,” as if my brand were available for rent

At one point, I saw my brand identity referenced on dark-market forums — appearing to be available or “unclaimed,” despite my legal ownership of the name and domain.

No Human Path to Resolution

Despite having:

• Business verification

• A long-standing Gmail account protected by physical 2FA

• Direct referrals from people inside Google and Meta

There were no callbacks.

No escalations.

No reviews by a real person.

Even a family friend — a senior Google executive — submitted my case to the internal security team.

What I received in return?

Another form.

Another loop.

This time, with no verification questions and no resolution.

Even when you do everything right, the system can still fail you.

This Wasn’t Just Hacking — It Was a Brand Takeover

Someone didn’t just try to log into my accounts.

They tried to absorb the digital perimeter around my name:

• Hijacking search visibility

• Rerouting my Google Business profile

• Injecting fake map pins and metadata

• And exploiting the very platforms where I had once been verified

It was silent, sophisticated, and impossible to stop — because the systems simply weren’t built to address this kind of attack.

Where I Am Now

As of today:

• I no longer have access to my legacy email , YouTube, Instagram, Facebook, TikTok, or Twitter

• I have not initiated brand deals, collaborations, or outreach since April 23, 2025

• I am not contacting leads or clients through any alternate channels

If you receive communication using my name or brand — please verify it at SincerelySusye.com.

I am actively documenting everything and securing what I can.

At the same time, I’ve chosen to return to structured work within the tech world — not out of retreat, but as a strategic move to stabilize, protect my identity, and rebuild from a position of clarity and strength.

This isn’t retreat.

It’s strategy.

A Note to Big Tech

You shouldn’t have to be famous to reclaim your name.

You shouldn’t need press coverage to be believed.

You shouldn’t need legal representation just to say: That’s me.

When digital platforms fail to protect the very people who built trust on them — creators, women, small business owners — it’s not just a support issue.

It’s an accountability one.

We need better safeguards.

We need real human support.

And we need it now.

To My Community — and to Anyone Monitoring This Post

I am not initiating any DMs, pitches, or business communications at this time.

If someone contacts you using my name or brand — please treat it with caution.

Verify only through my official site: SincerelySusye.com.

To everyone who’s helped report or flag suspicious activity — thank you.

You’ve helped preserve what I couldn’t reach on my own.

To those using my name or likeness without consent:

I am not engaging.

There is no access.

No opportunity.

No permission.

This is my real identity — not a lead generator.

Final Thought

If you’re navigating identity theft, platform lockout, or impersonation — know this:

You are not overreacting.

You are not imagining it.

And you are definitely not alone.

You don’t need to go viral to deserve protection.

You don’t need to shout to be heard.

You still have a right to your name, your voice, and your digital future.

I’m still here.

I’m still me.

And for now — that’s enough.

Sincerely, Susye

Support My Recovery

If this story resonated with you and you’d like to help, I’ve created a secure space where supporters can contribute.

Every donation — no matter the size — helps me secure new tools, stay protected, and rebuild.

This is my only secure donation page. Every bit helps me fight back, stay safe, and rebuild.

Thank you for standing with me in truth, in healing, and in protection.

Anyone reaching out with business proposals, influencer deals, or affiliate opportunities under my name is not affiliated with me. I’m not initiating any campaigns or collaborations — and I don’t use third-party booking forms or agencies. Always verify at SincerelySusye.com.


This Is Part 4 of My 6-Part Cybersecurity Series

After falling victim to identity theft, impersonation, and advanced digital hijacking, I began documenting what no one prepares you for — and how to protect yourself if it happens to you.

Each post builds on the last to uncover how modern threats can infiltrate your blog, your devices, your network — and even your identity.

Read the Full Series:

Part 1: How I Woke Up to My Blog Being Hijacked (And How to Protect Yours from Bad Actors) | What started as blog impersonation exposed deeper issues with digital platform trust, AI-generated clones, and account takeovers.

Part 2: It Looked Like Instagram — Until It Hijacked My Life | How a spoofed iOS app and Apple Configurator 2 gave someone else control of my iPhone — even after 11 DFU restores.

Part 3: How to Tell If Your WiFi Is Hacked (And What to Do About It) | A poisoned router. A spinning light. A drone overhead. Learn how smart homes get silently surveilled — and how to shut it down.

Part 4: Locked Out and Looping: What Happens When Big Tech Won’t Help You Reclaim Your Identity | What to do when account recovery fails, Apple IDs stay compromised, and your real name is no longer under your control.

Part 5: You Don’t Have to Go Viral to Be Vulnerable | Even without fame, you can become a target. Here’s what I’ve learned about long-term threat persistence, digital healing, and rebuilding trust in your own devices.


Rights & Media Policy

This series and all content published on SincerelySusye.com are protected by copyright.

Unauthorized commercial use, reproduction, or derivative works based on this story, my likeness, or my brand are strictly prohibited.

SincerelySusye™ is the trademarked brand identity of Susye Weng-Reeder, LLC, and may not be used, reproduced without written permission. Impersonation in any form is prohibited.

All written content, brand language, and story material on this site are © Susye Weng-Reeder, LLC. All rights reserved.

For responsible press, media, or collaboration inquiries, please contact me directly via SincerelySusye.com.

I reserve the right to decline interviews or features that do not reflect the care, truth, or sensitivity this topic requires.

Thank you for respecting the integrity of my story.

Licensing Terms

Unless explicitly stated otherwise, all original written content, images, and brand assets published on SincerelySusye.com are the intellectual property of Susye Weng-Reeder, LLC.

You may NOT copy, reproduce, redistribute, quote extensively, or republish any portion of this site — including blog posts, visual content, and storyline material — for commercial use or public distribution without prior written permission.

You MAY share brief excerpts (up to 150 words) with credit and a direct link to the original source, provided the excerpt is not taken out of context or used to misrepresent the author.

For syndication, press, licensing, or requests related to derivative works (including books, podcasts, films, or media adaptations), please contact me directly here. 

Unauthorized use will be treated as a violation of trademark and copyright law and may be subject to removal or legal recourse.

This site is protected under U.S. copyright law and the Digital Millennium Copyright Act (DMCA).

Similar Posts

Leave a Reply