Independent Research & Analysis

The Unseen War

A documented look at surveillance law, state-sponsored cyberweapons, covert influence operations, police corruption, and the intelligence conflict between the United States and China.

What this site covers: All content draws from publicly available sources — court proceedings, federal indictments, declassified reports, parliamentary records, and investigative journalism. This site is educational. No classified material is reproduced here.

Personal Testimony

⚠️
First-Hand Account
My Experience — Cyberwarfare & Psychological Operations
Liam G's personal documentation of sustained psychological operations, digital interference, algorithmic manipulation, false flag operations, family targeting, and extrajudicial coercion over 2 to 2.5 years+.
🔔
Insider Disclosures
FBI Whistleblowers — Including The 9/11 Warnings
Coleen Rowley's 13-page Mueller memo (Moussaoui / Minneapolis), the Phoenix Memo, Sibel Edmonds gagged by State Secrets, Frederic Whitehurst's lab exposé, Mike German, Terry Albury's Intercept leaks, and Robert Wright's press conference on FBI HQ steps.
Legalised Hacking
Intelligence Crimes — How The State Legalised Its Own Hacking
Direct quotations from the Equipment Interference Code of Practice — keyloggers, USB exfiltration, vulnerability exploitation — warrants signed by Secretaries of State or Scottish Ministers, plus the Prestwick Airport polling (56% / 60% against) and the political culture that signs all of it.
📱
Open Letter to Apple
Spyware Capabilities — Letter to Apple Security
Formal open letter to Apple Security requesting verbose server-side logging, log preservation, and a Pegasus-class indicator-of-compromise review on my Apple ID. Includes the 35-minute "Photo Slideshow" background access anomaly from the App Privacy Report and a full map of the observed implant capabilities.
🎤
Personal Allegation
Digital Wiretap — Used as Bait Without Consent
Personal account of being used as a non-consenting listening post against people around me, with my device as the microphone — and the kidnapping, home-invasion, break-in and extortion attempts that followed when those people worked out who the recording came through. Framed against RIPA Part II, the CHIS Act 2021, and ECHR Articles 2, 3 and 8.
🎬
Sting Architecture
Entrapment — Manufactured Crimes, Manufactured Defendants
The Alex Jones / Gavin O'Blennis undercover video, plus the Newburgh Four, Liberty City Seven and Whitmer plot informant patterns. Personal allegation that the same toolkit has been used against me — and speculation about Lil Durk, "Slide for Von," and AI-edited audio in federal court.
🕵
Methods & Tactics
Unethical Methods — Documented & Alleged
A detailed breakdown of state and non-state tactics: fake social profiles (FOIA-confirmed), FBI journalist impersonation, MITM webpage modification, sleep deprivation, AI-generated content weapons, digital grooming, and religious manipulation.

UK Surveillance Law

👁
UK Law
UK RIPA & the Investigatory Powers Act
How Britain built one of the most sweeping legal surveillance frameworks in any democracy — bulk interception, equipment interference, spy cops, GCHQ, and documented abuses from councils to MI5.
Oversight Failure
Complaints & Suggestions — Kangaroo Courts
Why the IPT, IOPC, IPCO and ISC together amount to an accountability-free zone — and how the Paul Chowles 50-BTC theft proved that not one of five internal NCA controls ever fires until an outsider forces it.
🛡
Insider Breach
GCHQ & MI5 Scandals
Hasaan Arshad — the Manchester student who walked top-secret files out of GCHQ Cheltenham on his work phone — plus the bulk-data IPT ruling, Katharine Gun, Manchester Arena, and the CHIS Act criminal-conduct authorisations.
🏏
Location Data
Spyware, Spatial Tracking & Pokémon Go
How consumer apps — including Pokémon Go — harvest precision location data at scale, how law enforcement purchases or subpoenas it, and how it is used to profile, intimidate, and threaten.

UK Police Corruption

🔒
Active Trial
Police Scotland: Intelligence Leaked to Gangsters
Two detectives — David Smith and Christopher Dougherty — on trial for leaking top-secret Scottish Intelligence Database records to organised crime, cocaine use on duty, and perverting the course of justice over 12+ years.
NCA / Crypto
NCA: The 50 Bitcoin Theft
Paul Chowles — how 50 Bitcoin was allegedly stolen from a criminal's seized wallet during an NCA investigation, how every internal system failed to detect it, and how independent blockchain analysis caught what the NCA could not.

US Profiling Law

Civil Liberties
California RIPA: Racial & Identity Profiling Act
California's landmark anti-profiling law — what it requires, how it can be weaponized by both government and institutions, and documented cases of loophole exploitation.

US Government — Cyber Arsenal

🔐
Classified Leaks
Military-Grade Cyberweapons
NSA's Tailored Access Operations, EternalBlue, Stuxnet, Vault 7, and PRISM — the documented arsenal of state-sponsored exploits and how they escaped into the wild.
🌐
Geopolitics
The US–China Cyberwar
Volt Typhoon, Salt Typhoon, the OPM breach, Microsoft Exchange compromises — a timeline of the ongoing digital conflict between Washington and Beijing.

China — Covert Operations

👨‍💼
Influence Ops
Compromising Mayors & Local Officials
The CCP's United Front Work Department targets city councils, mayors, and state legislators. Documented FBI cases, federal indictments, and the mechanics of soft-power coercion.
Intelligence
China Executes US Spies — Publicly
Between 2010–2012, China dismantled a CIA network and executed or imprisoned up to 20 assets. The New York Times investigation, the mole hunt, and Beijing's use of public executions as deterrence.

Legal & Editorial Notice — Please Read.