The 6’7” Tall Indian Isn’t Indian: Living Under Constant Surveillance

No average Indian is 6’7″. And yet, he’s there—watching me. I have no idea why.

At first, I thought maybe I’d witnessed something I shouldn’t have over the course of my career. But nothing I’ve seen stands out enough to justify this level of scrutiny. I haven’t been involved in anything beyond my professional job taking care sometimes of low-level gangsters—those who were stabbed, shot, or mentally disturbed by drugs or alcohol. So why the tracking?

Then I realized: I’d managed to spot an undercover intelligence officer on something dirty. Not one, not two, but several. Not from a single service, either, but from multiple.

Somehow, an untrained civilian like me, at all related with intelligence or secret services had clues on undercover operatives. And that made me a liability in their eyes.

So now, I have a tail 24/7. Every part of my life is under observation. Neither the job application responses are coming back. Are redirected!

I talk on the phone with voices cloning modulators wishing at the end of interview “have a nice Covid day!” Something like they aim to lose your minds!

And I can feel their frustration. They hate me because I undercover them and they are dirty “intelligent” networks.

They hired a behaviorist, trying to figure out how an average woman like me could do this.

Could I have contacts with other agencies?

To them, the idea that this could be natural is absurd.

This clue I realized was just two days ago: no average Indian is 6’7″.

And no Indian I know would stand in a coffee shop with a pretty smile for an old lady in a worn-out rain jacket. It wasn’t just the height that stood out—there was something about his vibe, his stance. He wasn’t there for coffee. He was there for me.

In surveillance work, you don’t wait at every point in someone’s routine. You only wait at the last place, the destination, because everything in between is just checking in. And this guy knew exactly where to be: the final point.

He’d studied my routine, my bus stop, my shop, my coffee stop. Everything.

And that’s when it shine to me: they didn’t just know me. They monitored me, every step of the way, like clockwork. And for what?

Just because I spotted the undercover game they thought was airtight? Monitored 24 hours a day. Every car trip, bus trip, or cab, becomes a case study for them. Naked or dress up they study me!

My question is simple: why am I being punished for being a good observant? Is my profession . I must be the best observant!

This constant surveillance strips away my normal life. Pictures with naked me overflow the internet, same as videos. They have fun messing around. WHO coordinate them?

Police refused to be involved! Too high to extend!

Catching a bus, waiting for a coffee—nothing feels like it’s just for me anymore.

I see these dirty agents around me, pretending to blend in but missing the mark every time. A right to privacy is supposed to be THE right.

And now that’s been taken from me just because I notice things others don’t.

The experience has left me wondering: is this what awareness costs?

If I can be tracked for no reason other than seeing what’s in plain sight, what does that say about the balance between security and privacy?

At what point do we say enough?

Emily’s Descent into the SADRAT Shadows

Emily was a rising star in New York’s financial sector.

As a sharp and dedicated financial analyst, her career was on an upward trajectory, and she was known for her integrity and commitment to her work.

However, unaware to her, Emily’s life had caught the attention of the CIA.

Through a covert operation, they began a methodical process of exploiting her without her knowledge, transforming her from a promising professional into an unwitting pawn in a dark game of espionage.


Spotting: The Initial Targeting

Joe David, a CIA officer tasked with gathering intelligence on a foreign organized crime corporation suspected of illicit activities, first came across Emily’s profile during a routine search for potential leads.

Emily, with her access to sensitive financial information, seemed like a perfect candidate for surveillance.

However, rather than attempting to recruit Emily as an asset, the CIA decided to monitor her without her knowledge.

Approaching Emily directly with a recruitment offer carried the risk that she might refuse to cooperate. If she declined, it could potentially compromise the operation or alert her to the CIA’s interest, making her more cautious and difficult to monitor.

Much more Joe David knows that by monitoring Emily without her knowledge, the CIA maintained complete control over the operation. They could gather information on their own terms without relying on Emily’s willingness or ability to provide it.

If Emily were to become aware of the CIA’s interest, even as a potential recruit, there was a risk that she might inadvertently leak the information or become a security liability. Keeping her in the dark minimized the chances of exposure.

The CIA likely assessed that Emily’s position, network, and access to sensitive information made her highly valuable even without her direct involvement. By tapping into her life, they could gather all the intelligence they needed without the complications of managing a human asset.

In certain operations, especially those considered high-priority or sensitive, intelligence agencies might bypass standard ethical considerations, opting for methods that ensure the greatest operational success. Monitoring Emily covertly allowed the CIA to exploit her position without the moral and legal complexities of formal recruitment.

David Joe initiated the spotting phase by quietly collecting information on Emily’s life—her work habits, social connections, and online presence. They mapped out her daily routine and identified her closest contacts, all while Emily went about her life, completely unaware of the invisible eyes watching her every move.

The first step they did was gathering publicly available information. The CIA combed through Emily’s online presence, including her social media profiles, LinkedIn, and any public records that could provide insight into her career, education, and personal life. They looked for details such as her job role, career trajectory, connections, and any public posts that might reveal her interests, concerns, or vulnerabilities.

By monitoring her social media activity, the CIA gathered information on her social circle, hobbies, political views, and emotional state. They paid close attention to her posts, comments, and interactions to build a psychological profile. They also analyzed her network of friends and colleagues to identify key relationships and potential leverage points.

The agency accessed Emily’s financial records, including her credit report, bank accounts, and any outstanding loans or debts. This provided them with a clearer picture of her financial situation, revealing her substantial financial obligations due to her father’s medical bills. The CIA assessed this as a potential vulnerability that could be exploited if needed.

The CIA deployed a surveillance team to observe Emily’s daily routine. This included tracking her routes, noting the locations she frequented, and timing her schedule. They discreetly followed her as she went to work, attended meetings, and participated in social events. This physical surveillance helped them understand her habits, patterns, and potential weak points in her security.

With them also began preliminary electronic monitoring.

This involved intercepting her communications, such as phone calls and emails, to gather real-time intelligence on her interactions and conversations. This was done covertly, using sophisticated technology to avoid detection. The data collected helped them understand her professional dealings and any personal issues that might make her more susceptible to influence.

They identified key figures in her life—friends, mentors, colleagues—and evaluated their potential significance. This mapping helped the CIA understand who might influence Emily and who could be indirectly exploited through her.

Using the information gathered, the CIA constructed a detailed psychological profile of Emily. They assessed her personality traits, stress levels, ethical boundaries, and emotional triggers. This profile was crucial for determining how best to manipulate her without her awareness.

    Throughout this spotting phase, Emily remained completely unaware that her life was under such intense scrutiny. The CIA’s methods were designed to be unobtrusive, ensuring that Emily continued her daily routine without any suspicion that she was being watched.

    This extensive and covert data collection set the stage for the CIA’s deeper involvement in her life, leading to the subsequent phases of the SADRAT process.


    Assessing: Understanding Her Life

    The assessment phase involved deepening the CIA’s understanding of Emily’s vulnerabilities and connections.

    Emily’s vulnerabilities were key factors that made her an attractive target for the CIA’s covert operation. These vulnerabilities were meticulously identified and exploited during the spotting phase:

    Emily was a single mother, raising her young daughter, Lily, on her own.

    This role placed immense pressure on her both financially and emotionally. Without a partner to share the burden, Emily had to juggle the demands of her job with the responsibilities of motherhood. She often found herself working late into the night after putting Lily to bed, trying to stay on top of her workload while ensuring her daughter received the care and attention she needed.

    The CIA recognized this as a significant vulnerability.

    Emily’s constant juggling act left her little time for herself, making her more isolated and easier to manipulate. The stress of balancing work and parenting also made her more susceptible to mental and emotional strain, which could be exploited in a high-pressure situation.

    Emily’s isolation was compounded by her lack of a strong personal support system.

    She had few close friends and limited contact with her family, who lived in a different state. Most of her social interactions were limited to colleagues at work, but even these relationships were superficial. Emily’s focus on her career and daughter left little room for cultivating deep personal connections.

    This isolation made Emily vulnerable because she had no one to turn to for advice or support when things started to go wrong. The CIA knew that without a strong network, Emily would be less likely to detect or resist subtle manipulations. They could operate with less fear of her confiding in someone who might recognize the signs of surveillance or exploitation.

    Despite her hard work and dedication, Emily’s job as a financial analyst was relatively low-paid, especially considering the high cost of living in New York City.

    She struggled to make ends meet, particularly with the added burden of raising a child on a single income. Her financial situation was made worse by the medical bills she incurred while caring for her ailing father, who had recently passed away.

    The CIA identified her financial struggles as a critical vulnerability.

    They knew that Emily’s financial anxiety could push her to make decisions she wouldn’t otherwise consider, especially if it meant securing a better future for her daughter.

    Although the agency didn’t intend to offer her money directly, they exploited her need for financial stability by monitoring her communications and identifying opportunities where they could discreetly influence her decisions without her realizing it.

    Years of working long hours while managing the responsibilities of single motherhood had left Emily emotionally exhausted. She was often too tired to engage in social activities, and her emotional reserves were depleted. This emotional exhaustion made her more susceptible to stress, anxiety, and depression, leaving her vulnerable to manipulation.

    The CIA knew that individuals experiencing burnout are less likely to notice subtle changes in their environment or the behavior of those around them.

    Emily’s emotional state made it easier for the agency to increase their surveillance and manipulation without raising her suspicions. Her mental and emotional fatigue meant she was less likely to challenge or question the unusual events that began to occur in her life.

    Emily had an overwhelming sense of responsibility toward her daughter, her job, and her late father’s legacy. She was determined to provide the best possible life for Lily, which often meant sacrificing her own well-being. This deep sense of duty made her push herself beyond her limits, leading to further isolation and stress.

    The CIA exploited this by creating scenarios where Emily felt an even greater burden, knowing she would be too focused on fulfilling her responsibilities to notice that she was being manipulated. They used her dedication against her, ensuring that she was too preoccupied with keeping her life together to recognize the external forces at play.

    These factors made her appear more susceptible to manipulation, but instead of approaching her directly, the CIA used this knowledge to justify their invasive surveillance.

    David’s team began tapping Emily’s phone, hacking her emails, and listening in on her private conversations—both at work and in her personal life.

    They bugged her office, her car, and even her home, turning her life into a source of intelligence. Every conversation she had, every decision she made, was recorded and analyzed. Emily, meanwhile, had no idea that her privacy was being systematically violated.


    Developing: Increasing Surveillance

    In the developing phase, the CIA escalated their surveillance efforts.

    Emily’s entire life became an open book. They tracked her movements in real time, recorded her interactions with colleagues and friends, and even monitored her social outings. The CIA gathered an overwhelming amount of data, analyzing every aspect of her professional and personal relationships.

    As the CIA decided to escalate their surveillance efforts on Emily, their methods became increasingly invasive, crossing ethical and legal boundaries. The agency, determined to gather more detailed information and exert greater control over the situation, began to take drastic measures.

    The CIA’s surveillance team, now fully committed to the operation, initiated unauthorized break-ins at Emily’s home.

    They timed these intrusions carefully, ensuring they occurred when Emily was either at work or occupied elsewhere, often late at night when she was least likely to return unexpectedly. During these break-ins, the agents would discreetly search through her personal belongings, looking for anything that could provide further insight into her life, her relationships, and her state of mind.

    They rifled through her private papers, diaries, and correspondence, searching for information that could be used to better understand her vulnerabilities or anticipate her actions. They looked at family photos, noting the absence of other adults and the presence of her daughter, which reinforced their understanding of Emily’s isolation and the pressures she faced as a single mother.

    In their quest for control, the CIA team occasionally took personal items from Emily’s home.

    These could be anything from documents that they wanted to study more closely, to sentimental objects that could be psychologically significant. For example, they might take a favorite piece of jewelry or a child’s toy, not only to analyze but also to see how Emily reacted to the disappearance of these items. This was a test of her emotional resilience and a way to gauge her awareness of being under surveillance.

    The breaking point for Emily came when she noticed the disappearance of a deeply sentimental item—a bracelet that had belonged to her late mother. The loss of this personal object, coupled with the unexplained changes in her home, left Emily feeling utterly violated.

    She could no longer deny that something was terribly wrong.

    The agents involved in the operation began to mock Emily behind the scenes, dehumanizing her as they discussed the details of her life.

    They laughed about the personal items they had taken and how easily they had breached her most private spaces. This callous attitude further demonstrated the ethical decline within the team, as they treated Emily not as a person but as a mere object in their game.

    However, this wasn’t enough for the agency. They wanted more.


    Accessing: Exploiting the Information

    Without Emily ever providing a single piece of information knowingly, the CIA gathered everything they needed through their invasive monitoring.

    They intercepted her communications with clients and friends, recorded sensitive business strategies discussed in private meetings, and pieced together a comprehensive picture of the foreign corporation’s financial activities.

    The agency’s actions had devastating effects on Emily’s professional life.

    As the CIA exploited the information gleaned from her surveillance, Emily started noticing that the people she interacted with—colleagues, friends, and even casual acquaintances—began to experience strange misfortunes.

    Projects she was involved in suddenly failed, clients she interacted with faced unexpected legal troubles, and friends she confided in started experiencing professional setbacks.

    Emily remained unaware of the connection between these events and the surveillance surrounding her.

    As rumors spread about her supposed incompetence and the strange events surrounding her, Emily found herself increasingly isolated at work.

    Colleagues who had once been friendly began to avoid her, either out of fear of being associated with her or because they were genuinely worried that whatever was affecting her could impact them as well.

    The office environment became hostile, with whispered conversations and side glances making it clear that Emily was no longer welcome in the inner circles of her workplace.

    The failures and rumors prompted her firm’s management to increase their scrutiny of Emily’s work.

    They began to monitor her closely, reviewing her communications, checking her work more rigorously, and questioning her decisions.

    This added pressure only exacerbated Emily’s stress, leading to mistakes she might not have otherwise made. The increased oversight made her feel like she was under constant surveillance, mirroring the actual covert surveillance she was unaware of.

    Ultimately, the pressure became too much, and Emily was forced to leave her job.

    Whether she was formally dismissed or felt compelled to resign to escape the toxic environment, her departure marked the end of her once-promising career.

    The financial industry, being highly interconnected, meant that finding a new job was nearly impossible with her now-tainted reputation.

    Emily’s career, which she had worked so hard to build, was effectively over, leaving her with few options and no clear path forward.

    The constant stress and anxiety from the unexplained events in her professional and personal life took a toll on Emily’s mental health.

    She began to suffer from insomnia, depression, and anxiety, which affected her ability to focus and perform. Her declining mental state led to a further drop in productivity, creating a vicious cycle where her deteriorating performance fueled more professional setbacks, which in turn worsened her psychological condition.

    Terminating: The Aftermath

    The CIA’s final step in the SADRAT process—termination—came swiftly and without warning.

    Once they had extracted all the information they needed, they abruptly ceased their surveillance.

    The mysterious interference in Emily’s life ended as suddenly as it had begun, leaving her to deal with the aftermath alone.

    But the damage was done.

    Emily’s life had been turned upside down.

    Emily started to piece together the fragments of what had happened. She realized that her life had been systematically dismantled by forces she couldn’t see or control.

    The humiliation and betrayal were overwhelming—she had been used and discarded without her knowledge or consent, and the consequences were dire.


    Emily’s Decision: Seeking Justice

    Determined not to let her life be ruined without a fight, Emily decided to take action.

    She reached out to a few remaining contacts who hadn’t yet abandoned her, including a lawyer with expertise in privacy and surveillance law.

    Together, they began to document the strange events that had plagued her life—the failed projects, the inexplicable setbacks, and the sudden change in how others treated her.

    With this evidence, Emily pursued legal action, not just against her employer but also against the government agencies responsible for the surveillance.

    Her case drew public attention on all public media platforms, highlighting the ethical and legal violations that had been committed.

    Emily’s fight became a rallying cry for others who had been similarly exploited, leading to a broader conversation about the dangers of unchecked surveillance and the need for stronger privacy protections.


    Conclusion: A Cautionary Tale

    Emily’s story serves as a warning about the dangers of covert surveillance and the CIA’s SADRAT process.

    Spotting, assessing, developing, accessing, and terminating without ever directly involving the target led to devastating consequences for Emily.

    She was never an asset, never provided information knowingly, and yet, her life was torn apart by the actions of an agency operating in the shadows.

    The repercussions of using individuals as unwitting pawns are profound.

    Emily’s experience shows how easily lives can be destroyed when intelligence operations are carried out without regard for personal privacy and consent.

    Her determination to seek justice, despite the overwhelming odds, stands as a undeniable proof to the importance of transparency, accountability, and the protection of individual rights in the face of misused powerful forces.

    Fight for EMILY @NormalityAI !

    WATCHLISTING – an artcraft by intelligence agencies or an objective intelligent tool?

    The nature and mechanisms behind being watchlisted by intelligence agencies touches on several complex and controversial issues.

    You are SURE that you watch the bad guy?

    Individuals are typically placed on watchlists because they are perceived as potential threats to national security. This perception can stem from various factors such as associations, communications, travel patterns, and activities that raise suspicion. The level of suspicion required to be placed on a watchlist can vary. It often involves a combination of intelligence reports, tips, and automated data analysis. The exact criteria are typically classified and can differ between agencies and countries.

    Which country hates you? And why?

    Photo by NastyaSensei on Pexels.com

    While agencies as entities are responsible for watchlisting, the decisions are made by individuals within these agencies based on intelligence and data. There can be instances of corruption or mistakes, leading to unjust watchlisting. Misinterpretation of data, biases, and personal vendettas can all play a role.

    WHO hates you and why?

    Photo by Lukas Rychvalsky on Pexels.com

    “Artcrafting” suspicion involves manipulating or selectively interpreting evidence to justify watchlisting. This can occur in corrupt or highly pressured environments where outcomes are prioritized over accuracy. In some cases, agencies might deliberately attempt to discredit individuals by creating or exaggerating suspicions. This can be used to neutralize perceived threats or dissidents.

    Photo by Ioana Motoc on Pexels.com

    People who have worked in proximity to intelligence operations, even unknowingly, can attract scrutiny. Their knowledge and experiences might be seen as potential risks. Watchlisting is often systemic and involves extensive resources, suggesting it is more likely carried out by government agencies rather than individual haters or small groups.

    Photo by Pixabay on Pexels.com

    There can be significant overlap between the tactics used by organized crime and those employed by corrupt elements within intelligence services. Both can involve manipulation, intimidation, and control. Unlike individual haters or smaller groups, organized crime and corrupt agencies have the resources to implement systemic monitoring and watchlisting.

    Photo by Sora Shimazaki on Pexels.com

    Intelligence agencies might engage in extensive monitoring to decode the activities and networks of individuals they suspect. This could involve assessing work history, affiliations, and personal interactions. If an individual demonstrates abilities or knowledge without formal training, this might trigger suspicion. The inability of agencies to understand how someone acquired their skills can lead to mislabeling them as a threat.

    Photo by cottonbro studio on Pexels.com

    Refusing to cooperate with intelligence or corrupt federal entities can also lead to increased scrutiny and watchlisting. Non-cooperation can be viewed as suspicious behavior.

    Individuals who are difficult to categorize or understand might be labeled as crazy, especially if their knowledge or actions defy conventional explanations. It’s challenging to defend against such labeling, especially in the absence of transparency and accountability from the agencies involved.

    Photo by Andrea Piacquadio on Pexels.com

    The complexities surrounding watchlisting involve a blend of legitimate security concerns, potential corruption, and systemic biases.

    Proving that corrupted or incompetent intelligence services are responsible for unjust watchlisting requires thorough investigation, transparency, and accountability.

    Documenting interactions, understanding the criteria for watchlisting, and advocating for legal reforms are critical steps in addressing these issues.

    For a deeper dive into the guidelines and implications of watchlisting, refer to the ACLU’s analysis.

    My bugged eyeglasses

    I swear that I would never prefer, but never ever write this story. But it is time to write it because it is very possible that the company that made and promoted my bugged eyeglasses to do unethical business put many people’s privacy in danger.

    I suspected my eyeglasses of spying on me for a long time, since 2018, in fact. Until then, I used my old ones made for me in the US. Those became old, and the company went out of business

    Photo by Stephen Niemeier on Pexels.com

    From the moment I started using the new pair, it felt like I was broadcasting in real-time the places and people that I met. But I never had the certainty that it was true.

    I blamed my bugged car. I stopped using it. Blamed my bugged cell. I left it behind when I met people. Bugged laptop. I stopped using it. My bugged apartment key. I changed the lock. My bugged backpack. I changed it. I even changed my road trip every time. But I am still tracked wherever I go, whoever I meet.

    Photo by Ketut Subiyanto on Pexels.com

    And I know it’s the eyeglasses because in 2018, the beginning of this tracking craziness happened in the house of an important city personality. He was unable to talk, but his speech was projected into his ears toward microphones from his eyeglasses, and video cameras on them were recording and transmitting video captions and sound in real-time. In fact, someone else was given “his words” by listening and seeing through “his eyes.”

    Photo by Lisett Kruusimu00e4e on Pexels.com

    Later on, the same dirty experiment was applied to me when their project became extended, and a whole company delivered “the spying” eyeglasses attack on people’s privacy.

    But how did I have the proof that it was the eyeglasses broadcasting real-time images and sounds?

    Today, my cell phone and my computer were not with me. I left them in my backpack outside the toilet room. Public toilet rooms don’t have video cameras.

    I had nothing that could possibly have a video camera with me except for my eyeglasses.

    On one of the walls of the public toilet, someone had scratched “WHO the Fxxk is Alice?”

    I hadn’t searched for this song on YouTube or online, but I saw the words on the public toilet wall only today.

    After finishing my business and returning to the other public building room, I retrieved my cell phone. I opened YouTube, and the first song that came up was…”WHO the fxxk is ALICE!”

    https://youtu.be/BSfW8L4ZJRA

    I was stunned!

    Today I had the proof! My eyeglasses ARE bugged!
    It was impossible for my cell phone to communicate with the toilet room unless my eyeglasses had a monitoring camera broadcasting images and sounds.

    And if it is possible, that means that hundreds of thousands of citizens’ privacy is at risk because this company plays dirty with privacy behind eyeglasses.

    My eyeglasses put so many people in danger without my knowledge! Some psychopaths play dirty breaking people’s privacy!

    What would you do, if you would be me?

    I let my head down! I am not shy! But I am ashamed of all of this mess that put in danger too many people!

    Dirty political psychopathy? Psychopaths running for money and fame?

    A beautiful soul song, people’s souls broken, lives and privacy destroyed.

    Please Investigate it! Protect people!

    Sing with me! Bent your head to protect others!

    Photo by Beyzaa Yurtkuran on Pexels.com