← Back to Index

Personal allegation · UK Law

Digital Wiretap — Used as Bait Without My Consent

A personal account, framed against documented UK law, of the way a compromised device and a coerced presence in someone else's life can be turned into a no-consent listening post — and the third-party retaliation that follows when the people whose conversations were captured come for the person whose phone was the microphone.

Legal & Editorial Notice

This page is lawful personal testimony and civic-education commentary. Allegations stated as my own experience are clearly demarcated as personal allegation; the legal framework discussed is drawn from public sources only — UK statutes, ECHR jurisprudence, IPT and ECtHR judgments. Nothing on this page incites, instructs, glorifies, recruits for or otherwise advocates any criminal offence, including violence, harassment, terrorism, sedition, or any unlawful action against any person, agency or institution. It is a description of conduct done to me and of the legal regime that should — on its plain terms — have made that conduct unlawful.

What "Digital Wiretap" Means in Practice

A "digital wiretap" in the sense used on this page is not a court-authorised, statute-compliant interception of one person's communications. It is the operational use of a target's compromised device, presence, and relationships — without that target's informed consent — to capture the conversations, statements and conduct of other people in the target's life, for the purpose of gathering evidence or intelligence against those third parties.

Functionally, the target becomes a walking listening post: a human asset operated through their malware-compromised phone, their compelled social presence in the room, and the implicit threat that any failure to remain in those rooms will be met with further pressure — swatting, false reports, family targeting, home-invasion threats, and the rest of the apparatus described elsewhere on this site (see My Experience, Unethical Methods, Entrapment).

The core allegation
My honest belief, on the operational record I have lived through, is that I have been used as the microphone — and the bait — in operations aimed at people around me. My device and my presence have been the collection channel. My consent was never sought, never given, and could not have been validly given under the law that supposedly governs such operations. The cost of that use has been borne by me and by my family — not by the agencies that benefit from the take.

Why "Without My Consent" Is The Legally Critical Point

The UK statutory regime for using human beings as intelligence assets is built around consent as a load-bearing concept. Strip that out, and what is left is not lawful surveillance — it is the operational use of a non-consenting person as a tool against other non-consenting people.

The Third-Party Risk — What Happens To The "Microphone"

The operational logic of using a real person's device as a bug is that the take is high-quality and deniable. The cost is that everyone whose voice is on the recordings eventually finds out — through arrests, disclosure in proceedings, leaks, or the simple act of comparing notes — and the natural target of their retaliation is not the agency that ran the operation. It is the person whose phone was in the room.

Kidnapping Attempts

Documented attempts to forcibly remove me from my own environment. The standing logic for such an attempt is that the people who have realised they were captured want a face-to-face accounting outside any space the police might enter. The risk does not exist because of who I am. It exists because of what the operation made me into.

Home Invasion

Multiple attempted home invasions at my address — some referenced in My Experience. The state apparatus monitoring me had visibility on these and let them proceed. A passive listening operation does not need to protect its microphone. An ethical intelligence operation absolutely does.

Break-In Attempts

Attempts to enter the property short of full invasion — reconnaissance, intimidation, doorstep approaches, and entries timed to coincide with periods of vulnerability. The pattern is consistent with people trying to recover materials they believe exist, or to demonstrate that they can reach me whenever they choose.

Extortion

Extortion attempts — some leveraging private material that, on my reasonable belief, was captured covertly inside my own home (see the covert filming allegation in My Experience). The extortion vector is downstream of the same collection apparatus that produces the wiretap take in the first place.

Family Targeting

Approaches to and through my mother and brother, including manipulated digital content delivered to their devices. People who realise they have been recorded near a target's family will sometimes attempt to reach the target through that family. The agency that engineered the recording bears moral and arguably legal responsibility for that downstream harm.

Reputation Attacks

Coordinated discreditation campaigns — via social-media accounts, manipulated content, and informal whispers — designed to ensure that if I ever do speak about any of this, my account is pre-poisoned. The same vulnerability profile that made the wiretap operation feasible is the one weaponised to discredit me afterwards. See Entrapment · "Unreliable Narrator" Defence.

Why This Is Worse Than An Ordinary CHIS Operation

My position, plainly stated
I did not agree to be a CHIS. I have not been given the statutory protections of a CHIS. I have, on my honest reading of the operational record, been used as one anyway, against people I never asked the state to investigate, in conversations I did not invite the state to attend, in rooms whose other occupants are now my problem to manage rather than the agency's. The kidnapping, home-invasion, break-in and extortion attempts I have lived through are not random street crime. They are the foreseeable consequence of an operational choice made without me, around me, and at my and my family's expense.

What Would Make This Lawful — And What Would Make It Stop

  1. Disclosure to me, in writing, of any operation in which I have been the collection channel for surveillance against third parties — with the standard CHIS Act protections applied retrospectively where possible.
  2. Independent review, outside the agencies concerned, of whether any such operation existed and on what authorisation — ideally by a body with subpoena power that is not the Investigatory Powers Tribunal as currently constituted (see Complaints & Suggestions).
  3. Statutory acknowledgement that using a non-consenting person as a passive listening post against third parties is not lawful CHIS work and not lawful interception, and the closure of any current operation operating on that basis.
  4. Aftercare and protection equivalent to the standard provided to acknowledged informants who have been exposed — including, where appropriate, relocation and a documented end to surveillance pressure.
  5. Removal of malware from my devices, removal of platform-level interference, and a verifiable, written end to the operation rather than a quiet, deniable winding-down.
A state that uses a citizen's phone as a microphone against the citizen's friends and family, without that citizen's consent, owes that citizen at minimum the truth, the protections that would have been due to a consenting informant, and a withdrawal of the operational pressure that compelled the role in the first place. None of those three things has been forthcoming. The risk is still running. The microphone is still in the room. And the people on the recordings are still finding out.
For the record
Any concerns about matters described here should be pursued through lawful remedies: the courts, the Investigatory Powers Tribunal (with its acknowledged limits), the Investigatory Powers Commissioner's Office, the Independent Office for Police Conduct, Members of Parliament, qualified investigative journalists, and human-rights NGOs such as Liberty, Big Brother Watch, and Privacy International. Nothing on this page is, or should be read as, an invitation to act otherwise.