The Shadow Puppet Master

Chapter 1: The Shadow in the Code

Kars Voss was not just a rogue cyber-security expert; he was a master of systems manipulation.

His expertise allowed him to weaponize every aspect of modern technology to infiltrate, control, and destroy his victims’ lives.

Sofia Calderon, a kind-hearted foreign nurse, became his target—not out of necessity, but because of Kars’s deep-seated personal vendetta.

After months of meticulous planning, Kars unleashed a full-scale digital assault on Sofia’s life, using her own devices and connections against her.


Chapter 2: The Web of Control

Home Internet Connection

Kars began by exploiting Sofia’s home network. He used DNS Spoofing, redirecting her web traffic through his malicious servers. This allowed him to monitor her online activities in real time and control what websites she accessed. When Sofia tried to visit her bank’s website, for example, she was unknowingly redirected to a cloned version he had created.

He also planted network sniffers on her router to capture every piece of unencrypted data passing through her home Wi-Fi. Using these tools, he intercepted passwords, messages, and even private conversations made through her smart home devices.

To maintain control, Kars subtly slowed down her connection or caused intermittent outages. These disruptions made Sofia reliant on her service provider, where Kars had already spoofed her identity to manipulate support responses.

Television and Streaming Services

Sofia’s smart TV became another tool in Kars’s arsenal. Using her network credentials, he accessed the TV’s settings remotely, adding custom scripts that allowed him to display manipulated content. Sometimes, her favorite shows would suddenly cut off, replaced by strange error messages or eerie, distorted audio clips that left her feeling unnerved.

He even replaced her Netflix and streaming recommendations with bizarre or disturbing shows, making her question her mental state. On several occasions, he froze her TV entirely, claiming it was due to “network issues,” while sending her fake support emails offering “technical assistance.”

Websites and Online Presence

Through session hijacking and MITM (Man-in-the-Middle) attacks, Kars inserted himself into Sofia’s interactions with websites.

He tampered with her job application portals, ensuring her submissions never reached potential employers. If she submitted a form, Kars intercepted it and replaced it with nonsensical or unprofessional content. She never received a response back!

On social media, Kars cloned her accounts, creating fake profiles that interacted with her friends and colleagues. He posted inflammatory or embarrassing content under her name, causing people to distance themselves.

When Sofia tried to reset her passwords, Kars intercepted the reset emails and redirected her to fraudulent sites, where he captured her new credentials.

Phone Manipulation

Kars exploited Sofia’s smartphone by hacking into its SIM card through a process known as SIM swapping. Posing as Sofia, he convinced her mobile carrier to transfer her number to a device under his control. This gave him access to her two-factor authentication codes, voicemail, and text messages.

He also installed spyware on her phone, enabling him to:

  • Record her calls.
  • Track her location in real time.
  • Access her camera and microphone, allowing him to monitor her private moments.

Kars sent her fake text messages from her bank or clinic, causing confusion and disrupting her daily life. He even rerouted important calls from her employer, making it appear as though she was unresponsive or unreliable.

Emails and Communications

Using phishing techniques, Kars sent Sofia emails with seemingly legitimate attachments, like work schedules or notices from her landlord. Once opened, these attachments installed keyloggers on her devices, giving him complete access to her email accounts.

He began altering her email conversations:

  • Messages from her family were delayed or rewritten to sound dismissive or angry.
  • Job offers were deleted or replaced with rejections.
  • Communications with her employer were subtly edited to make her seem unprofessional or rude.

Kars also subscribed her to hundreds of spam services, inundating her inbox with garbage emails and making it impossible to find anything important.

Job Applications and Career Sabotage

When Sofia applied for new nursing positions, Kars sabotaged every step.

He created fake job listings on legitimate platforms, leading her to waste time and energy on applications that went nowhere.

For legitimate applications, Kars intercepted her resumes and modified them to include errors or bizarre claims, ensuring she never got callbacks.

When employers did manage to reach her, Kars rerouted the communications through his systems, either deleting them or responding with inappropriate messages.

Family Communications
Through his control over Sofia’s phone and email, Kars severed her ties with her family. He sent cruel or dismissive responses to their messages and altered incoming messages to sound accusatory.

When Sofia tried to call her mother, Kars intercepted the call and played pre-recorded audio clips of her mother’s voice, making it seem like she didn’t want to speak to her.

The psychological toll was immense, leaving Sofia isolated and emotionally devastated.


Chapter 3: The Crumbling World

The effects of Kars’s relentless assault on Sofia’s life were catastrophic.

Her landlord believed she wasn’t paying rent due to manipulated banking records and notices.

Her clinic lost faith in her reliability after repeated “missed calls” and strange email exchanges she didn’t recall sending.

Friends withdrew from her, confused by her seemingly erratic behavior online.

Sofia grew paranoid, doubting her own memory and sanity.

She stopped trusting technology, avoided using her phone, and became increasingly withdrawn.

The strain on her family was unbearable. Her mother died with Sofia keeping calling her, while Sofia sank deeper into guilt and despair.


Chapter 4: The Breaking Point

One night, Sofia noticed something strange while using an old laptop. Emails were arriving differently, with timestamps that didn’t match her phone’s records. This discovery led her to confide in a trusted colleague, who brought in a cyber-forensics expert.

The investigation revealed the full scope of Kars’s control.

Her entire digital life was running through a cloned network under his command.

The team worked tirelessly to dismantle his systems, using counter-hacking techniques to sever his access and redirect his attacks into a digital void.


Chapter 5: Justice and Recovery

Kars’s operation was exposed to law enforcement, leading to his arrest and the unraveling of the organized crime network he had enabled.

Though Sofia’s life was in shambles, she began the long process of rebuilding.

With support from friends, family, and legal advocates, Sofia regained control of her digital presence. She became an outspoken advocate for cybersecurity awareness, determined to ensure no one else would suffer as she had.

For Kars, the walls of his cell were a fitting mirror of the digital cages he had built for his victims. In the end, the man who had thrived on control found himself powerless and alone.

Date a Nut: How I Was Poisoned by a Digital Pill and Tracked by an Organized Crime Network

By StoriesOfStories

It all began innocently enough: a date, a nut, and what seemed like an ordinary day. But hidden in that small bite was the start of something far more sinister—an intelligent digital pill planted inside me by a corrupt network of organized crime and intelligence operatives. This is my story, the story of how a seemingly harmless snack became the tool to track and monitor my every move, and how a mentally disturbed engineer named Michael, along with his vast criminal network, turned me into their personal target.

The Players: A Corrupt Network, Organized Crime, and Intelligence

Michael, a radio telephony engineer with deep ties to intelligence and organized crime, led this dangerous network. Behind his respectable position in the army’s telecommunications unit was a dark secret: he and his family were part of a vast, corrupt network extending to the highest political levels. Their crimes—financial manipulation, political corruption, and more—were hidden behind layers of official respectability. But one day, by chance, I stumbled upon their dirty activities.

From that moment on, I was marked as a threat. They began watching me, planning, waiting for the right time to act. Michael, his associates, and their corrupt allies in law enforcement and intelligence decided I needed to be silenced. But they didn’t choose the typical path of violence or intimidation. Instead, they turned to something far more advanced and insidious—a digital pill that would track me wherever I went.

The Poisoning: How I Was Tricked

It happened on what seemed like an ordinary day. I was invited to a workshop and I met someone I thought I knew, someone I trusted. But nothing was as it seemed. My “friend” was actually an undercover agent working for Michael’s network. As we sat and talked, they offered me a plate of dates stuffed with nuts. I had no reason to suspect anything, even if my gut sense told me so, so I reached for one, unaware of the deadly plan unfolding before me.

Hidden inside the nut was a digital pill—a tiny device that, once ingested, would dissolve in my body and begin transmitting my location in real time. Within minutes, my life changed forever. I had unknowingly swallowed a digital tracker, designed not to help or heal but to make me a living, breathing target.

How I Realized I Had Been Poisoned

The moment of realization came with a chilling comment from Michael. Disguised and pretending to be casual, he suddenly bashed me with laughter and said, “You got Met.”

At first, I thought it was a simple joke—maybe a play on words related to the fact that we had just met. But there was a twisted, darker meaning behind his words. “Met” could refer to more than just the past tense of meeting; in his disturbed mind, it was a layered reference to something much more sinister—perhaps even methamphetamine or methanol poisoning.

It was this bizarre phrase, delivered with such cruel amusement, that tipped me off to the fact that I had been poisoned. That strange, haunting wordplay, combined with the increasingly strange and threatening behavior from those around me, made it clear that something far more sinister had taken place. They had used their twisted humor to mock me, as if my fate was just another one of their sick games.

At first, I didn’t notice anything different. But soon, strange things started happening. People I didn’t know seemed to know exactly where I was. Anonymous threats flooded my phone and social media accounts. I was being harassed online by people with a frightening knowledge of my daily routine. It was as if I was being watched—closely.

As I pieced things together, I remembered the date with the nut and the suspicious way it had been served to me. I began to suspect something far more sinister than just intimidation. The timing was too perfect, and the harassment too coordinated. I started researching digital pills—tiny devices designed to track and monitor people for medical purposes. But in the hands of criminals like Michael and his network, this technology could be weaponized.

The symptoms I experienced—constant surveillance, geolocation, and data being sent to unknown parties—fit the pattern of someone who had swallowed a digital tracker.

They were using the digital pill to know my every move, ensuring I was under their control.

Michael and the Crime Network

Michael, the mentally disturbed engineer behind this operation, is not alone.

I saw him in action, conveniently modifying the setup of an entire nursing home’s alarm network system.

I saw him again, disguised as a woman, a musician, a homeless person—in various situations.

I also saw him breaking into internet networks, door security systems, and phone systems.

My European cell phone, which has a different setup than most, detected him under the MIHAILOV network.

Of course, it wasn’t a pleasant discovery for him to realize that I knew.

His family and associates are embedded in various layers of organized crime, reaching into the highest political circles.

Patrick W, another key player in this criminal web, works alongside him, all under the guise of respectable professions. But their real work lies in the shadows—covert operations, financial crime, and using technological tools to manipulate and destroy those who threaten to expose them.

Rabbi Simon Jacobson, another associate, as a hidden persona, just like Patrick and Michael hides behind religious or community roles, playing his part in the network’s schemes.


Together, this vast, intricate network pulls the strings, corrupting law enforcement, exploiting digital technology, and engaging in political manipulation.

They are untouchable—or so they think.

What to Do If You Suspect You’ve Ingested a Digital Pill

Once I realized what had happened, I knew I needed to act fast. If you ever suspect that you’ve ingested a digital pill like I did, here’s what you must do immediately:

  1. Seek Medical Help: The most important step is to get a doctor involved. Request a thorough medical checkup, and specifically ask for an X-ray or CT scan. Many digital pills contain metallic components that can be detected through imaging. Explain your symptoms clearly to the medical professionals, as they might not initially believe the severity of the situation.
  2. Stop All Bluetooth and Wireless Connections: Digital pills often transmit data wirelessly. Turn off all Bluetooth, Wi-Fi, and location services on your devices. Any signal the pill might use to communicate can be disrupted by cutting off external connections.
  3. Distance Yourself from Connected Devices: These pills usually transmit data to nearby receivers—wearables like smartwatches or smartphones. Keeping away from your devices, or even placing them in a Faraday cage (a signal-blocking pouch), can prevent them from sending or receiving any tracking information.
  4. Document Everything: Keep a detailed record of every strange encounter, digital harassment, and physical symptom you experience. This will be invaluable if you decide to report the incident or seek legal help.
  5. Contact Authorities or Whistleblower Organizations: If you’re facing harassment or tracking, it’s crucial to notify law enforcement.

    However, given that I was dealing with corrupt officials and corrupted INTELLIGENCE officers part of one of the most large International organized crime networks, I was careful about who I trusted.

    Organizations that specialize in whistleblowing or fighting corruption may be more trustworthy than local law enforcement in some cases.

The Aftermath: Living as a Tracked Target

Once the digital pill was inside me, the network made it clear they were watching. (just watch the videos of Mr. Patrick aka That Brazilian Couple and Rabbi Simon Jacobson and look at the next day digital pill video of Andrew Bustamante.

CIA WAS AWARE OF POISONING as a digital pill too! WOO WAS IN? IF CIA wasn’t?



This wasn’t just a form of intimidation—it became entertainment for them.
Whoever was “them”.

Every time I left my home, every step I took was tracked. And with their advanced connections in technology and intelligence, they had access to everything—my movements, my habits, my fears.

Michael and his associates weren’t just passive criminals.

They took pleasure in knowing that they could manipulate and control me without ever having to confront me directly.

The harassment on social media continued relentlessly.

They knew when I was at home, where I went, and who I talked to. I was a puppet in their twisted game, being watched at all times.

Why I Refuse to Give Up

In moments of extreme distress, I began to wonder if there was a way out—if there was a way to end the torment. But I want to make one thing abundantly clear to anyone reading this:

Suicide Is Not the Answer

It’s easy to feel overwhelmed when you’re being targeted, tracked, and harassed by such a powerful network.

But no matter how bad it gets, suicide is never the solution.

What they did to me—what they might do to others—is wrong. It’s illegal. It’s a violation of human rights.

But ending your life only lets them win. They want you to feel powerless, but you’re not. There are ways to fight back, even when it feels hopeless.

The first step to reclaiming your life is knowing that you’re not alone.

International organized crime thrives on secrecy, on the idea that no one will believe you.

But once your story is out in the open, you take away their power. You shine a light on their crimes, and they lose the ability to operate in the shadows.

A Call for Awareness and Justice

This story isn’t just about me—it’s about the hundreds, maybe thousands, of others who have been victimized by these corrupt networks.

They use technology to invade our privacy, to control us, and to intimidate us into silence. But we can’t let them win. We need to spread awareness about the dangers of digital pills and how organized crime is adapting technology for malicious purposes.

I call on the media, law enforcement, and human rights organizations to investigate these abuses. What happened to me is not an isolated incident. It’s part of a larger problem of organized crime and corruption exploiting the most vulnerable.

To anyone reading this: be cautious, be aware, but don’t give up. There is always hope, and there are always people who will believe you, stand by you, and help you fight back. Together, we can bring this dark network to light and stop them from using innocent people as their targets.


StorieOfStories shares this story not only to shed light on a personal experience with a digital pill microchip and International organized crime but to raise awareness of how technology can be misused by malicious actors. This story is a call to action for the media and the public to investigate, expose, and stop the exploitation of individuals through advanced digital tools. Remember, no matter how dark it seems, there is always a way forward—and you are not alone.

My bugged eyeglasses

I swear that I would never prefer, but never ever write this story. But it is time to write it because it is very possible that the company that made and promoted my bugged eyeglasses to do unethical business put many people’s privacy in danger.

I suspected my eyeglasses of spying on me for a long time, since 2018, in fact. Until then, I used my old ones made for me in the US. Those became old, and the company went out of business

Photo by Stephen Niemeier on Pexels.com

From the moment I started using the new pair, it felt like I was broadcasting in real-time the places and people that I met. But I never had the certainty that it was true.

I blamed my bugged car. I stopped using it. Blamed my bugged cell. I left it behind when I met people. Bugged laptop. I stopped using it. My bugged apartment key. I changed the lock. My bugged backpack. I changed it. I even changed my road trip every time. But I am still tracked wherever I go, whoever I meet.

Photo by Ketut Subiyanto on Pexels.com

And I know it’s the eyeglasses because in 2018, the beginning of this tracking craziness happened in the house of an important city personality. He was unable to talk, but his speech was projected into his ears toward microphones from his eyeglasses, and video cameras on them were recording and transmitting video captions and sound in real-time. In fact, someone else was given “his words” by listening and seeing through “his eyes.”

Photo by Lisett Kruusimu00e4e on Pexels.com

Later on, the same dirty experiment was applied to me when their project became extended, and a whole company delivered “the spying” eyeglasses attack on people’s privacy.

But how did I have the proof that it was the eyeglasses broadcasting real-time images and sounds?

Today, my cell phone and my computer were not with me. I left them in my backpack outside the toilet room. Public toilet rooms don’t have video cameras.

I had nothing that could possibly have a video camera with me except for my eyeglasses.

On one of the walls of the public toilet, someone had scratched “WHO the Fxxk is Alice?”

I hadn’t searched for this song on YouTube or online, but I saw the words on the public toilet wall only today.

After finishing my business and returning to the other public building room, I retrieved my cell phone. I opened YouTube, and the first song that came up was…”WHO the fxxk is ALICE!”

https://youtu.be/BSfW8L4ZJRA

I was stunned!

Today I had the proof! My eyeglasses ARE bugged!
It was impossible for my cell phone to communicate with the toilet room unless my eyeglasses had a monitoring camera broadcasting images and sounds.

And if it is possible, that means that hundreds of thousands of citizens’ privacy is at risk because this company plays dirty with privacy behind eyeglasses.

My eyeglasses put so many people in danger without my knowledge! Some psychopaths play dirty breaking people’s privacy!

What would you do, if you would be me?

I let my head down! I am not shy! But I am ashamed of all of this mess that put in danger too many people!

Dirty political psychopathy? Psychopaths running for money and fame?

A beautiful soul song, people’s souls broken, lives and privacy destroyed.

Please Investigate it! Protect people!

Sing with me! Bent your head to protect others!

Photo by Beyzaa Yurtkuran on Pexels.com