top of page
Search

The Big Apple

Updated: Mar 17


This Chapter is more than my story—it’s a call to action.


This chapter highlights how technology can be both a powerful tool and a dangerous weapon. At the end of this chapter, I’ll share the steps I took to help you identify and protect your devices from being used against you


Christmas 2023 brought what seemed like a thoughtful gift from Neil— my 13' Apple laptop. At first, I was grateful and touched by his gesture, but hindsight revealed it as a calculated move. At the time, I was still using a Windows computer I had purchased from "The Russian Empire State" a laptop that came with its own set of quirks. Neil kept encouraging me to switch to the Apple laptop, and give my old computer to my daughter.


By the end of January 2024, I had fully transitioned to the Apple laptop. When I finally began using the new laptop, I couldn’t shake the feeling that something wasn’t right. On March 12th, 2024 a text I received from a member of "The Underground" raised concerns when Neil was very much invested like he knew something. He even questioned me about it the next morning when i hadn't shared with him. That unease turned into certainty on June 29, 2024, when an unsettling discovery confirmed my suspicions.


On that day, I was experiencing issues with my computer and changed my key password and other passwords. Especially as things were heating up after the discovery of Ms. "New Hope, Photography" . I had briefly left my purse on the kitchen counter to use the bathroom. Inside was the new key pass to access my updated laptop settings. Neil was in the kitchen at the time. Shortly after, I attempted to reset my password only to uncover, when I checked the password hint, I was met with a mocking response: “YOU TRIED IT! FAFO.” The message wasn’t mine, and it was accompanied by a profile picture I hadn’t set yet a photo from my personal gallery. I quickly took a photo and made sure to document everything that seemed out of place after this.

ree

When I confronted Neil about the incident, he denied it, dismissing my concerns as baseless. His denial, paired with the breach I uncovered, only deepened my suspicions and unease.


In September 2024,  I moved out of New Rochelle, believing I could escape the oppressive control and safety concerns, I quickly realized the reach of their influence. The tactics, the monitoring, and the psychological abuse persisted, making it clear that two distinct forces were deeply involved in this operation: Neil’s network and Drag-0’s.


As I continued piecing together the layers of manipulation and monitoring. It wasn’t just Neil or Drag-0 acting alone. They used the trust of others to add another layer to the psychological abuse.


On October 19, 2024, while attending a Halloween event at my sister’s workplace, I received a WhatsApp call from Drag-0. This was the first time he used this app to contact me, rather than his usual method. The timing was far from coincidental—I was just about to enter a haunted house with my family and kids. What seemed like an ordinary call was anything but; it became a glaring symbol of his persistent intrusion and psychological tactics.

ree

As I began documenting events during the Halloween gathering, a noticeable shift occurred in the behavior of those present, including my sister. Subtle cues, gestures, item placement and avoidance painted a clearer picture. It became apparent that the individuals at the event were tied to the same network I had been uncovering. The revelation felt both shocking and validating, especially as it connected back to Neil and Drag-0’s coordinated efforts. Further confirming the events from October 6, 2024,


ree

Previously, I had reached out to my sister for job assistance and resources from her establishment, hoping to regain some stability. Her response was dismissive: “It would be a conflict of interest.” At the time, the reasoning felt off, but I accepted it at face value. On October 19, everything clicked. The “conflict” wasn’t professional; it was personal. Her involvement wasn’t just passive—it was active, aligning with Drag-0’s network.


Neil’s attempts to mask his involvement remained persistent, even as I tried to sever contact. In one instance, I blocked his number on my phone, but his messages still came through on my computer. This wasn’t just a technological oversight; His messages aligned with my critical discoveries, as if he was one step ahead—an unnerving realization that underscored the coordinated nature of the abuse.


By November 2024, Each day was a new discovery towards blatant indication of unauthorized access. I reached out to Apple Support (shout out to Earl from Apple Tech Support), desperate for answers. Their confirmation unraveled the mystery further: if a laptop was previously signed into another iCloud account and not properly logged out before being gifted, the original account holder could still access the device; validating my experience.


While syncing my phone with the laptop, I noticed Drag-0’s name appeared he has never been anywhere close or connected to my Apple computer (at least not to my knowledge or approval) This wasn’t random; it was evidence Neil’s and Drag-0’s involvement wasn’t just theoretical—it was tangible, embedded in the technology I relied on daily.

ree

ree
ree
ree

Drag-0’s manipulation extended to our daughter. The discovery in July 2024 of her about taking part in the blackmail validated my suspicions "breakdown".


On November 11, 2024, as I was documenting and uncovering these connections, Drag-0 began excessively calling our daughter's iPad. This wasn’t the first time his actions aligned with critical moments. Partially activities on my devices involving documenting, contacting authorities, and lawyers.


ree

It became clear to me our daughter became an unwitting tool in his tactics, used to deliver messages or instill fear. Recognizing this only deepened my resolve to fight back—not just for myself, but for her and anyone else who might find themselves caught in similar situation.


I began to suspect my daughter’s involvement further. Her behaviors raised questions about certain actions that I will explore more deeply in "Children of the Sky"


On September 10–11, 2024, as I was preparing documentation for my lawyer, Drag-0 abruptly announced his need to travel to Serbia to see his father

ree

a former general during the war when the U.S. intervened in the region.

ree

The timing, like so much else, was far from coincidental. It was in that moment that everything I had previously overlooked about both Drag-0 and Neil came into focus, and I realized that Project Arc 16 wasn't a joke they made but a real thing.

Take Action

Empower yourself by taking the first step.

Here are quick, actionable steps to protect yourself and empower change

  • Secure Devices: Regularly check for unusual activity, update passwords, and enable two-factor authentication.

  • Document Concerns: Keep a record of incidents, including screenshots or descriptions, for evidence.

  • Mental Resilience: Its ok not to be ok. Trust, there were (and still are moments) times hard to get out of bed, even taking 10 min to find grounding practices like running, meditation, or creative outlets to strengthen your focus.

Build Awareness

Join the Mission

  • Connect with EchoShow88: Share your story, join forums, or attend events.

  • Support Others: Contribute by spreading awareness or donating to aligned causes like the ones on Echoshow88 homepage.

 
 
 

Comments


bottom of page