PIECING it all TOGETHER
- Liz Alvarez
- Jan 12
- 4 min read
Updated: Mar 21
Recap
In the next chapter, The Russian Empire State , you'll learn the far-reaching implications of its system that predates even before Google itself. This chapter will uncover how data analytics, SEO, and digital manipulation have been weaponized, creating vulnerabilities not only for individuals but for our national security.
Before I dive into the systemic exploitation of its digital systems and its ties to larger geopolitical agendas, Below youll learn how to spot a "fake" and a recap of the previous blog post to help you piece together these events and the importance of learning,
The Neuroscience of Behavior Awareness
Reactive behaviors like are rooted in our neurobiology. The brain’s amygdala, responsible for processing fear and emotional responses, often overrides calculated reasoning when individuals are under stress or attempting to hide something. Even with training or rehearsal, subtle cues—like changes in posture, pacing, eye movement, or how objects are handled—can betray what someone is truly feeling.
These reactions are challenging to suppress because they are instinctive. For example:
Sudden departures: Often signal an attempt to distance oneself from a situation that feels threatening or overwhelming. Such as avoidance and rapid shifts in behavior.
Hyper-controlled movements: Such as carefully arranging items in a specific way, may indicate overcompensation, where the individual is trying to appear calm but is internally conflicted.
Trust your instincts: If something feels off, it likely is.
Understanding the connection between behavior and neurobiology can help you sharpen your awareness and recognize patterns that might otherwise go unnoticed.
In the context of this broader investigation, these small yet telling moments are vital pieces of the puzzle, reinforcing the importance of staying vigilant, documenting observations, and acting on instinct. As I move into the next chapter, The Russian Empire State , these insights will further highlight how manipulation operates not only on a systemic level but also through individual human interactions.
Key Events Timeline
July 2024: Discovery of Daughter's Involvement
Event: Walked in on my 10-year-old daughter crying on the phone with Drag-o, confessing her involvement in blackmail.
Significance: This was the first indication of children and other individuals targeted and were part of a much larger issue.
May 2024: Life Insurance at NY Interview
Event: Attended an interview that later tied to "Project Deadpool."
Significance: Early warning signs included conflicting directions from managers and the hiring manager’s insistence on specific test answers. These were later linked to Neil’s monitoring and manipulation.
June 4, 2024: Parking Incident
Event: Received an email about an unauthorized vehicle in the parking lot, later connected to Amy and Neil’s affair.
Significance: This highlighted Neil’s use of others to facilitate his deceit and manipulation.
June 29, 2024: Laptop Breach
Event: Discovered unauthorized access to my laptop, with a mocking password hint (“YOU TRIED IT! FAFO”) and a profile picture taken from my gallery.
Significance: Provided direct evidence of Neil’s monitoring and marked a turning point in uncovering his actions.
September 10–11, 2024: Drag-0’s Announcement
Event: Drag-0 abruptly announced a trip to Serbia to visit his father, a former war general, while I was preparing legal documentation.
Significance: This suspiciously coincided with my investigative actions, further tying him to the operation.
October 3, 2024: Neil’s Photo in Group Chat
Event: While searching Apple Messages, discovered Neil’s photo in a kids' group chat. The photo disappeared minutes later.
Significance: Linked Neil directly to the manipulation of group chats involving children.
October 6, 2024: Confrontation with Neil
Event: Confronted Neil about the group chat photo. He deflected blame onto Drag-0 and mentioned my aunt, whom he had never met.
Significance: Exposed Neil’s attempts to mask his involvement and implicated additional players in the operation.
October 19, 2024: WhatsApp Call from Drag-0
Event: Drag-0 contacted me via WhatsApp for the first time as I entered a haunted house with family and kids.
Significance: Marked a deliberate psychological tactic to induce fear and control.
November 11, 2024: Excessive Calls
Event: Drag-0 began incessantly calling my daughter’s iPad during critical moments of my documentation process.
Significance: Demonstrated one of the many ways Drag-0used our daughter as a tool.
November 14, 2024: The Big Apple
Event: Apple confirmed that my laptop was still connected to another iCloud account, allowing continued access.
Significance: Validated suspicions of Neil’s and Drag-0’s involvement in unauthorized monitoring.
Overarching Takeaways
Patterns Don’t Lie:
Pay attention to recurring behaviors, timelines, and coincidences. When patterns emerge, they often reveal the truth behind seemingly random events.
Trust Your Instincts:
If something feels off, it probably is. Don’t dismiss your gut feelings—document and investigate them.
Documentation Is Power:
Keeping records—whether screenshots, notes, or voice memos—can provide clarity and evidence in moments of confusion or doubt.
Your Devices Are Your Frontline:
Regularly audit your digital devices for unauthorized access. Tools like password managers, two-factor authentication, and regular updates are essential for safeguarding your personal information.
Look Beyond the Surface:
Manipulators often use misdirection to hide their true intentions. Pay attention to subtle cues, reactions, and inconsistencies in their stories.
Community and Support Are Crucial:
Sharing your experiences, seeking support, and finding solidarity with others can provide strength in the face of manipulation.
Knowledge Is a Shield:
Understanding how technology, psychological tactics, and social engineering are used against you is the first step to reclaiming control.





Comments