
NCIC Surveillance Abuse: Life Under Constant Interference
NCIC surveillance abuse describes the sustained interference, monitoring, and disruption that can follow entry into interconnected law-enforcement databases such as NCIC and TCIC.
By LeRoy Nellis
January 2026
See supporting records: systemic timeline and live evidentiary record.
Legal reference: U.S. Constitution
In 2019, I entered the NCIC/TCIC system.
I did not understand what that meant.
I understand now.
This was not the start of due process.
This was the start of disruption.
What followed was not a single event. It was a pattern.
Persistent. Expanding. Systemic.
NCIC Surveillance Abuse — A Life Under Interference
- Accounts accessed or altered without authorization
- Emails disappearing or failing to deliver
- Content modified or removed
- Private communications appearing externally
- Surveillance extending beyond digital into real-world interactions
This was not a breach.
This was pressure applied over time.
Financial Monitoring and Employment Disruption
The interference escalated.
Financial activity appeared known to others in ways that defied normal access.
Spending patterns. Timing. Context.
Information that should have remained private.
Employment followed the same pattern:
- Unexpected terminations
- Lost opportunities
- Reputational damage without explanation
No notice. No transparency. No due process.
Social Mapping and Isolation
The effects spread outward.
People disappeared.
Professional contacts withdrew.
Personal relationships shifted without cause.
The pattern was consistent:
Isolation as outcome.
Surveillance as Punishment
Surveillance became the punishment.
No charge required.
No trial required.
No endpoint defined.
Once inside the system, the effects persisted.
Indefinitely.
Constitutional Injury
- First Amendment — speech and association
- Fourth Amendment — unreasonable surveillance
- Fourteenth Amendment — due process
- Property and privacy rights — financial and professional harm
This is not theoretical.
This is lived impact.
Why I Am Speaking
Silence is part of the system.
It isolates.
It discredits.
It suppresses.
It nearly worked.
It did not finish the job.
Call to Action
- Journalists: investigate database misuse
- Civil-rights groups: challenge silent surveillance
- Lawmakers: enforce transparency
- Public: reject normalization of invisible control
Technology does not override the Constitution.
Databases do not eliminate rights.
Silence is not consent.
Exposure creates accountability.

You must be logged in to post a comment.