Russian Empire State
- Liz Alvarez
- Jan 27
- 6 min read
Updated: Jun 29
PART 1
The world of online exploitation isn’t one of chance—it’s built on precision, secrecy, and deliberate concealment. These networks don’t just exist in the shadows; they are designed to be invisible. Hidden behind layers of encryption, coded communication, and restricted-access platforms, they ensure that only those who know how to look will ever find them. This is how exploitation networks operate, keeping their existence concealed while enabling the worst forms of abuse.
Research confirms this disturbing reality. Interpol reports that perpetrators use encrypted networks, private forums, and sophisticated digital methods to distribute child sexual abuse material (CSAM) while evading law enforcement. The U.S. Department of Justice further details how traffickers leverage dark web sites and coded entry points to sustain their operations. WeProtect Global Alliance emphasizes that digital platforms and private communities actively enable the expansion of CSAM, with new technology amplifying the risk.
The abuse isn’t just hidden—it’s evolving. Thorn’s 2022 research highlights the growing use of Generative AI to create CSAM, allowing criminals to bypass traditional detection methods. ECPAT International’s 2021 report further exposes how coded language, hidden sites, and manipulated AI-generated imagery contribute to this crisis.
These aren’t conspiracy theories; they are documented, studied, and ongoing crimes happening right now.
Throughout this chapter, I unpack the discovery that led me to understand the depth of this system. I also share with you how coded communication is used to facilitate these crimes and why mainstream platforms fail to address them effectively. Towards the end of this chapter, I encourage you to watch the Netflix documentaries that dive even deeper into these hidden networks.
These sites aren’t easily accessed. They aren’t something an average person stumbles upon. If found, they often require special codes, secret invitations, or deep knowledge of their inner workings.
I joined the Russian Empire State August 2019 per Neil's recommendation. I was thrilled! From Hudson Yards to the 65th FL of the most iconic building in NYC. I was feeling like Queen Kong!

The "opportunity" was exciting and nervracting at the same time. I started in an department I had no experience in but was ready for challenge. Despite the excitement, I always felt a bit uneasy at the fact that there were no cameras on their floor, how easy it was to even enter the building, or no cameras in the office. Especially since the security at my last job was like Fort Knox.
I sat in many meeting where I had to take notes, shadow and organize client portals. Due to my connection with Neil, I had a number of 1:1 with the founder. He started the Russian Empire before The Gs of Search was founded in1998, revolutionized the digital world, but he was already operating in the shadows. By mastering search engine manipulation, early analytics, and data exploitation on a massive scale.
Key Tactics Include
Search Engine Manipulation: Altering visibility of information to amplify or suppress content.
SEO Exploitation: Using strategic keywords and patterns to misdirect search results.
Analytics as a Weapon: Collecting and misusing user data to predict and influence behavior.
Here are a few ways on how you can protect yourself digital manipulation
Summer 2020 I was moved to a position within HR focused on engagement and retention. I was assigned to providing a Virtual Summer Camp for the kids of the employees. It was during the final stages of nearly securing the virtual camp that the client removed themself.

They had discovered the Russian Empire's involvement in the dark web involving children. I had no idea what the dark web was the time and when I asked about it, I was redirected and we carried on with our work and went with referred to here as "Camp Kro" in Nassau, NY that was closely associated with the Russian Empires.


Covid brought its own challenges especially for business. A number of business began to distanced itself from the Russian Empire at the SEO level, signaling a withdrawal from direct collaboration. Including the "The Best Pun Pigs". However, Neil’s continued contractual ties with the Russian Empire State through analytics and Adobe support reveal a deeper connection. This arrangement raises questions about ongoing influence, access, and the potential for data-driven manipulation.
JUNE 2ND 2020 I sat in a client call and was asked to take notes and shadow in. I recorded the meeting to make sure I didn't miss anything, little did I know that the meeting was an environment ripe for exploitation. One of the signals I recognized today was one Neil would use with me. For example Sniffing which Highlights or acknowledges.

Listen closely to the following cues in the video
Meeting Decoded
Sound/Action | Decoded Meaning |
Ding | Signal or Confirmation: Marks a significant moment, such as approval, acknowledgment, or transition. Often aligns with cues for action or emphasis. |
Sniff | Emotional or Subtle Cue: Communication emphasizing on a key point. In some cases, may also indicate manipulation or distraction. |
Buzzard | Surveillance or Threat: Symbolizes watchfulness, looming danger, or predation. Indicates observation or waiting for vulnerability. |
Tapping | Attention: Repetition indicate urgency. |
Turn the Page | Progression or Shift: Represents moving to the next topic, idea, or phase of the discussion. Indicates a deliberate transition. |
Pause | Reflection/Strategy: Signifies a moment of decision-making, indicate tension of a hidden agenda. |
Audit | Review or Inspection: Represents scrutiny, analysis, or accountability. Indicates a deeper examination of data, events, or actions. |
Drinking Water | Signal for Communication: A signal to team members or other parties to indicate alignment, readiness, or progression in discussion. |
Clicking of the Pen | Focus or Agitation: Symbolizes preparation, readiness, or impatience. Repeated clicking may signal a buildup of tension or urgency. |
Sure | Compliance or Deflection: A noncommittal response indicating agreement without depth. May also imply sarcasm or veiled reluctance depending on tone. |
Analytics platforms like Google and Adobe for example can serve as powerful engines for collecting, analyzing, and leveraging user data. While designed for optimization and marketing, their capabilities are increasingly being misused to manipulate behaviors like
Surveillance at Scale: These tools enable detailed tracking of user behavior, from browsing history to location, creating precise psychological profiles.
Behavioral Shaping: Tailored content and ads exploit vulnerabilities, steering decisions and perceptions without the user’s awareness.
Reinforcement of Bias: Echo chambers created by these tools isolate users from opposing viewpoints, amplifying division and misinformation.
Privacy Risks: The data collected can be exploited for identity theft, coercion, or geopolitical manipulation.
Here is an example of how these tools can be used in our everday life and not even know it.
The misuse of analytics tools and cloud systems presents a profound threat to individual privacy, societal stability, and even national security. By combining your data with advanced targeting techniques, entities like the Russian Empire State have:
Exploit emotional triggers to sway opinions and actions.
Spread misinformation or propaganda at scale.
Create hidden dependencies through psychological and behavioral manipulation.
Monitoring network and breach privacy, and perpetuate illegal activities undetected.
Forensic Awareness & Protecting the Truth
These manipulations aren’t always obvious, and the systems in place often fail to recognize them. For parents who suspect or uncover hidden exploitation or manipulation, relying solely on local law enforcement may not be enough. Many agencies lack the expertise to handle digital forensics or identify coded networks of abuse.
Instead, parents should consider:
Digital forensic specialists who can analyze devices and uncover hidden data.
Cybercrime units (state or federal) rather than just local police.
Organizations like NCMEC (National Center for Missing & Exploited Children) or Thorn, which focus on tracking and dismantling these networks.
Without the right approach, a parent could be manipulated, dismissed, or even falsely implicated—falling into their own "Parent Trap." This isn’t just about knowing the truth; it’s about making sure it holds up against gaslighting and systemic failures.
Dive deeper on these films that show how digital transformation can bring the dark side of humanity through GAI content like CSAM.
While the tactics of the Russian Empire State are sophisticated and covert, awareness is your first line of defense. Pay attention to patterns in communication, subtle shifts in behavior, and the misuse of data in digital spaces. The signs are there if you know what to look for.
Remember! Knowledge and awesness is your power of defense. By understanding these dynamics and remaining proactive, you can protect yourself, your loved ones, and your community from falling victim.
Stay tuned for the next chapter
Please note: In the event of any arrest, harm or death to me please share this blog with the proper authorities. I have attempted to share my conserns with different levels of authorities and because "a crime was not committed" they can not act. I have kept first names and have changed names for my own protection and the protection of the children involved. Links to upcoming blog title can be found highlighted below.



Comments