This page is lawful personal testimony and civic-education commentary. Allegations stated as my own experience are clearly demarcated as personal allegation; the legal framework discussed is drawn from public sources only — UK statutes, ECHR jurisprudence, IPT and ECtHR judgments. Nothing on this page incites, instructs, glorifies, recruits for or otherwise advocates any criminal offence, including violence, harassment, terrorism, sedition, or any unlawful action against any person, agency or institution. It is a description of conduct done to me and of the legal regime that should — on its plain terms — have made that conduct unlawful.
What "Digital Wiretap" Means in Practice
A "digital wiretap" in the sense used on this page is not a court-authorised, statute-compliant interception of one person's communications. It is the operational use of a target's compromised device, presence, and relationships — without that target's informed consent — to capture the conversations, statements and conduct of other people in the target's life, for the purpose of gathering evidence or intelligence against those third parties.
Functionally, the target becomes a walking listening post: a human asset operated through their malware-compromised phone, their compelled social presence in the room, and the implicit threat that any failure to remain in those rooms will be met with further pressure — swatting, false reports, family targeting, home-invasion threats, and the rest of the apparatus described elsewhere on this site (see My Experience, Unethical Methods, Entrapment).
Why "Without My Consent" Is The Legally Critical Point
The UK statutory regime for using human beings as intelligence assets is built around consent as a load-bearing concept. Strip that out, and what is left is not lawful surveillance — it is the operational use of a non-consenting person as a tool against other non-consenting people.
The Third-Party Risk — What Happens To The "Microphone"
The operational logic of using a real person's device as a bug is that the take is high-quality and deniable. The cost is that everyone whose voice is on the recordings eventually finds out — through arrests, disclosure in proceedings, leaks, or the simple act of comparing notes — and the natural target of their retaliation is not the agency that ran the operation. It is the person whose phone was in the room.
Kidnapping Attempts
Documented attempts to forcibly remove me from my own environment. The standing logic for such an attempt is that the people who have realised they were captured want a face-to-face accounting outside any space the police might enter. The risk does not exist because of who I am. It exists because of what the operation made me into.
Home Invasion
Multiple attempted home invasions at my address — some referenced in My Experience. The state apparatus monitoring me had visibility on these and let them proceed. A passive listening operation does not need to protect its microphone. An ethical intelligence operation absolutely does.
Break-In Attempts
Attempts to enter the property short of full invasion — reconnaissance, intimidation, doorstep approaches, and entries timed to coincide with periods of vulnerability. The pattern is consistent with people trying to recover materials they believe exist, or to demonstrate that they can reach me whenever they choose.
Extortion
Extortion attempts — some leveraging private material that, on my reasonable belief, was captured covertly inside my own home (see the covert filming allegation in My Experience). The extortion vector is downstream of the same collection apparatus that produces the wiretap take in the first place.
Family Targeting
Approaches to and through my mother and brother, including manipulated digital content delivered to their devices. People who realise they have been recorded near a target's family will sometimes attempt to reach the target through that family. The agency that engineered the recording bears moral and arguably legal responsibility for that downstream harm.
Reputation Attacks
Coordinated discreditation campaigns — via social-media accounts, manipulated content, and informal whispers — designed to ensure that if I ever do speak about any of this, my account is pre-poisoned. The same vulnerability profile that made the wiretap operation feasible is the one weaponised to discredit me afterwards. See Entrapment · "Unreliable Narrator" Defence.
Why This Is Worse Than An Ordinary CHIS Operation
- No agreement. A consenting informant accepts the risk in exchange for benefit. A non-consenting "source" accepts the risk because the alternative is more pressure. That is not informant work; it is coercion.
- No protection package. Real CHIS operations come with handler protection, safe-house options, witness-protection routes, and legal cover. A coerced microphone gets none of those. The risk all flows to the person; the benefit all flows to the agency.
- Third parties have no warrant against them. The conversations captured through a compromised device are interceptions of other people's communications. There is no warrant, no authorisation, no judicial supervision specific to those people. Their Article 8 rights are simply ignored.
- The "take" is laundered through the target. Evidence gathered this way can later be presented as if it came from a different channel — parallel construction — so the unlawful origin is never disclosed to the defence in any subsequent prosecution. See Entrapment.
- The microphone is disposable. Once the operation ends — or moves on — the person who was the collection channel is left exposed to every third party who has worked out what happened. There is no aftercare. There is no acknowledgement. The damage continues running long after the file is closed.
What Would Make This Lawful — And What Would Make It Stop
- Disclosure to me, in writing, of any operation in which I have been the collection channel for surveillance against third parties — with the standard CHIS Act protections applied retrospectively where possible.
- Independent review, outside the agencies concerned, of whether any such operation existed and on what authorisation — ideally by a body with subpoena power that is not the Investigatory Powers Tribunal as currently constituted (see Complaints & Suggestions).
- Statutory acknowledgement that using a non-consenting person as a passive listening post against third parties is not lawful CHIS work and not lawful interception, and the closure of any current operation operating on that basis.
- Aftercare and protection equivalent to the standard provided to acknowledged informants who have been exposed — including, where appropriate, relocation and a documented end to surveillance pressure.
- Removal of malware from my devices, removal of platform-level interference, and a verifiable, written end to the operation rather than a quiet, deniable winding-down.
A state that uses a citizen's phone as a microphone against the citizen's friends and family, without that citizen's consent, owes that citizen at minimum the truth, the protections that would have been due to a consenting informant, and a withdrawal of the operational pressure that compelled the role in the first place. None of those three things has been forthcoming. The risk is still running. The microphone is still in the room. And the people on the recordings are still finding out.