← Back to Index

Personal Testimony / Cyberwarfare / Psychological Operations

Experience — Cyberwarfare & Targeted Operations

Documentation of sustained psychological operations, digital interference, surveillance, algorithmic manipulation, extrajudicial actions, and coercion. A personal record by Liam G — Scotland, Scotland.

Legal & Editorial Notice

This page is the author's first-person personal testimony, offered as protected subjective expression on matters of public interest. It is not advanced as proven fact against any named third party where such a claim is not also separately documented in the public record. It does not incite, advocate, glorify, instruct or recruit for any criminal offence, including terrorism, sedition, violence, harassment, or any unlawful action against any person, agency or institution. Concerns described here have lawful remedies available — the courts, regulators, oversight bodies, MPs, qualified journalists, and human-rights NGOs — which are the appropriate routes for resolution.

Scotland, Scotland Psychological Operations Cyberwarfare Human Rights
What this page is: A personal, first-hand account of sustained cyberwarfare, algorithmic manipulation, threats, coercion, and extrajudicial conduct experienced over approximately 2 to 2.5 years+. Documented publicly because transparency is the only available protection. This page will be updated as additional information becomes available. All information is presented as personal experience and observation — without forensic analysis it is difficult to attribute with certainty, but that does not mean it did not happen.
Surveilled — comic-style illustration of state surveillance
SURVEILLED.jpg · A summary in one frame of what this page is documenting. The figure with the camera-head, the watching windows, the child held by the wrist, the words "it's for your safety and convenience" — this is, in image form, the experience I am describing throughout the rest of this page.

About

Liam G ~ exe 🙏
Scotland, Scotland — Age 22 (DOB: 16-09-2003)
Location Scotland, Scotland
Twitter / X @terminate — reinstated, but no longer posting — Bluesky: @execute4
Substack @execute4 — articles worth a read
Truth Social @execute4
Jurisdiction Scotland, Scotland — MLAT applicable; possible international/Canadian 0day involvement

Overview & Background

For the past 2 to 2.5 years+ I have been dealing with what I can only describe as cyberwarfare — primarily psychological in nature, though with increasingly physical dimensions that blur the boundary between digital and real-world harassment.

Scale & precedent

By any reasonable measure, this is one of the longest sustained digital interrogation and psychological-operations campaigns in modern history directed against a single, named, non-combatant civilian — running continuously for over two years, across multiple jurisdictions, multiple platforms, and multiple operational layers (algorithmic manipulation, malware deployment, social-engineering, family targeting, AI prompt-injection, false-flag personas, swatting, and direct in-person police approaches).

Even military targets — the people for whom psychological-operations and "disruption" doctrine was originally developed — are rarely subjected to operations of this duration, multi-modality and continuous intensity. Most documented PSYOP campaigns against foreign combatants are measured in weeks or months, not years. Most domestic counter-intelligence "disruption" actions against UK citizens — as discussed in GCHQ Scandals and the Mitting Inquiry's findings on undercover-policing — burn out, get reassigned, or trigger oversight intervention long before they reach the 24-month mark.

For an operation of this scope, this duration, and this density of methods to be running against a young Western UK citizen, in his own home, with no charge, no warrant disclosed to him, no judicial moment at which any of it is tested, and no oversight body willing to confirm or deny that any of it exists — is, by the standards of any healthy liberal democracy, unprecedented. It would be unusual if directed at a hostile foreign intelligence officer. Directed at a 22-year-old in Scotland who applied to join the British Army, it is, on its face, scandalous.

Due to explicit threats and other concerning developments, I have decided to document this experience publicly. I applied to join the army before I was ever arrested. I quit all my activities when this started happening. I'm trying to stay out of trouble, study, and get a job — I honestly don't deserve this, and nobody does.

Important: No interaction with police in real life has ever been bad — only digitally. Because digital they believe gives them plausible deniability, in my opinion. Keep that in mind when reading these allegations, especially regarding the haloperidol threats — no officer ever came up to me in person and said anything. It was always through digital means — algorithm, prompt injection, or manipulated search results.

Police Scotland Statement
Individuals I reasonably identify as Police Scotland officers have stated the situation is "above their paygrade" or that they "cannot/will not do anything to Americans" involved in these operations. It seems the once British Empire has been reduced to American lapdogs, watching Americans toy with me and my family.
Where I am now · Personal note

My @terminate Twitter / X account, which was previously suspended, has now been reinstated. I want to be clear though — I am not going to be posting on it anymore.

The reason is straightforward: I have quit my previous drug usage (cocaine, amphetamine, Adderall - the problems) Forced intervention. Looking back honestly, some of what I posted online during that period — and some of the people who engaged with me during it — were almost certainly a product of the state I was in. People may have taken advantage of me when I was on drugs, baited reactions out of me combined with periods of severe drug induced psychosis and maybe some say schizophrenic-aligned symptoms according to some psychiatrists but I have never heard any voices or anything but described as paranoid, screenshotted moments that were not representative of who I am, and used those moments later. I do not want to give anyone any further material of that kind.

"Be sober-minded; be watchful. Your adversary the devil prowls around like a roaring lion, seeking someone to devour."
— 1 Peter 5:8 (ESV)

That verse has stuck with me. The point of being clear-headed is not just spiritual — it is practical. Whether the people circling were operatives, opportunists, or both, the state I was in made it easier for them. Sobriety closes that door.

I should add for transparency that I am currently prescribed aripiprazole (Abilify). It is a medication that can, in some patients, increase impulsive behaviour — including impulsive online behaviour — which is one more reason I have decided that staying off social media posting is the right call for me right now. The medication is being managed responsibly and I would rather err on the side of silence than risk an impulsive post under it.

What I am trying to do now is straightforward: put the past two and a half years behind me, finish documenting what happened, and get a job. I have applied for a number of IT apprenticeships, so far unsuccessfully — if anyone reading this is in a position to help on that front, my CV is on this site and on my portfolio page: portfolio.html.

Quiet, sober, employed, and out of trouble is the plan. I would like to be allowed to get there.

🌐 Jurisdictions & Surveillance Frameworks

🇬🇧
United Kingdom
Schedule 7, Investigatory Powers Act — disproportionate use against activists. UK Police hinted via PC it was "above their paygrade" and they "cannot/will not" do anything to "the Americans."
🇺🇸
United States
FBI informant programs, COINTELPRO-style digital extensions, pattern-of-life analytics. Approximately 1 cybercriminal to 2 informant ratio in the USA.
🇨🇦
Canada
CSIS & CSE bulk surveillance, metadata exploitation. French Canadian keyboard connected in old seized iPhone logs — possibly traces of an iPhone exploit or 0day.
🇨🇳
China (False Flag)
AI-enabled social credit & mass behavioral profiling — used as false flag by Western intelligence. "If all else fails blame China and get them mentally detained."
🏴&#uDB40;&#uDC67;&#uDB40;&#uDC62;&#uDB40;&#uDC73;&#uDB40;&#uDC63;&#uDB40;&#uDC74;&#uDB40;&#uDC7F;
Scotland/UK
Targeted digital harassment, familial interference, previous home invasion, break-in attempt, kidnapping attempt, extortion attempt, and The Battle channel — suspects passed information by Police/Intelligence.

Core Allegations — Digital Operations

Malware & Traffic Rerouting

Police Scotland malware consistently re-routes all my traffic through Glasgow or Western Scotland-based IP addresses. I consistently notice Glasgow as my location when using Google or Gmail — even without a VPN — so they are clearly rerouting traffic through custom-built, custom-designed Police Scotland malware. We need to know the full extent and capabilities of this if my case is to proceed. This is serious, military-grade malware.

Algorithmic Manipulation & Malicious Advertising

They have also utilised what I suspect to be AI custom-generated advertisements, or malicious adware, designed to cause fear or distress. When I am clean off drugs they will promote #drugtwt or similar on X — something I have never seen before. This is extremely dangerous behaviour. Even some of the ads they have been promoting are distressing and not normal — people say ads are what you look for, but in this case definitely not. They have been manipulating it for a long time.

Claude AI sometimes says "this prompt is dangerous" — so it can and does detect their prompt injection. Any good lawyer is going to eat these people up.

Isolation Tactics

Police/Intelligence/Operatives/Criminals have utilised tactics such as isolation from support networks — friends, family. This includes impersonation of individuals I know, then acting as if those individuals were responsible for the hacking and rights violations committed against me. This is a documented police tactic — not just interrogating two people separately and claiming each is informing on the other, but actively impersonating people digitally and directing blame onto them. I believe through the algorithm they told me to "pin it all on Luke" — so they are probably doing the same with him and others, and even incentivising lying.

Indirect Threats & Medical Coercion

Law enforcement officers have made indirect threats regarding forced medical intervention — specifically referencing the administration of haloperidol against my wishes. They seem to want to bait me into getting myself detained by mental health services. The social media posts — including news articles but usually prompt injection on Grok, Claude, Gemini, and ChatGPT — are sometimes edited real posts, sometimes clearly fake. I will report them and get back a message saying the post or advertisement "never even existed" — so this is a problem, as it may be at the network level.

"Officers/Agents nudged or suggested they would have me put on haloperidol during interactions on my computer via algorithm or prompt injection, claiming it would 'resolve the situation' and that I 'need chemical restraint more than legal counsel.'"

These people never mentioned my mental health until after I neither confirmed nor denied whether I would co-operate with them. They gave me a number to ring; I ignored it. Since then they seem to have increased a vendetta. This constitutes a direct threat of non-consensual medical treatment, violating fundamental human rights and medical ethics. Whether directly or indirectly, they seek to undermine my credibility despite having tried to make me an informant — and now being vengeful since I refused. This directly shows they believe I am credible when I am sober and thinking clearly.

Attempt to Discredit
They want me to stop talking. They are subtly threatening me, thinking I don't have anything — that they can discredit me via mental health and drug usage. But over time everything I have said will come true. I have faith. I will never bow down to these intelligence agencies or police.

COINTELPRO-Style Campaign Analysis

I became the victim of a COINTELPRO-style counterintelligence stalking campaign by federal agencies (DHS/FBI/CIA) and their private defence contractors, reminiscent of MKULTRA methodologies. These entities treat my life like a game, manipulating and stirring conflicts depending on their operational objectives.

What began as overt harassment evolved into a sophisticated psychological operation where some operatives attempted to position themselves as mentors or coaches — a tactic now recognised as strategic grooming, designed to establish control and dependency while simultaneously undermining my ability to seek legitimate help.

Although my drug usage (cocaine, amphetamine, adderall, weed) is problematic — before Police/Intelligence/Operatives/Criminals involvement I never had any psychotic breaks. Only due to their threats, coercion, and malware have I become like this.

🏛
Federal Agency Involvement
Documented coordination between DHS, FBI, and CIA elements with private defence contractors operating in legal grey zones with minimal oversight.
🧪
MKULTRA Parallels
Psychological manipulation techniques mirroring historical MKULTRA programs, including sleep deprivation, gaslighting, and induced paranoia.
🎭
Strategic Grooming
Operatives adopting "mentor" personas to establish trust while simultaneously undermining autonomy — a classic counterintelligence disorientation tactic.
💹
Legal Barrier
Unable to obtain adequate legal representation due to concurrent charges that appear strategically timed to limit defence capabilities.

Telegram Channel "The Battle" — Doxxing & Physical Threat Risk

Authorities have permitted — and potentially facilitated — the operation of a Telegram channel called "The Battle" which has systematically published my personal information and that of my family members.

"The Battle channel has disseminated residential addresses, family member details, vehicle information, and daily routines — information that authorities knew or should have known would be used to facilitate home invasions and attempted kidnappings."

This reckless endangerment has directly resulted in:

Critical Escalation Pattern
The campaign demonstrates a clear pattern: digital harassment → doxxing → physical threats → extortion attempts → AI surveillance modelling. Each phase has been met with institutional inaction, suggesting either coordination or calculated indifference designed to maximise psychological impact while maintaining plausible deniability. The campaign has now escalated to include AI-generated models of relatives' houses — demonstrating surveillance capabilities and psychological warfare techniques designed to signal omniscience and create fear of physical violence.

False Flag Operations & Coercive Tactics

Following sustained harassment and threats, operators engaged in elaborate false flag operations — pretending to be foreign actors to coerce me and create pretext for expanded legal warrants. They also used "kompromat"-style material including medical records, psychiatrist records, botched medical operations, and social worker records — designed to humiliate and threaten to leak these private details completely unrelated to any investigation. This is more intrusive than the Vastaamo data breach, and extends to my family and innocent, underage relatives whose devices have been compromised.

"Agents pretended to be Chinese hackers, then Russian operatives, then both simultaneously — creating a fabricated narrative that I was involved with or assisting foreign terrorist entities. This was clearly designed to manufacture justification for wider surveillance warrants and increase psychological pressure through the implication of serious terrorism charges."

I will always be a Scottish national before anything.

🇨🇳
Chinese Hacker Persona
Initial impersonation of Chinese state actors using language patterns and technical signatures associated with APT groups. Created false narrative of foreign cyber espionage involvement.
🇷🇺
Russian Operative Persona
Subsequent shift to Russian intelligence persona incorporating Orthodox Christianity promotion via algorithm. Designed to create terrorism-related pretexts. I am Protestant — I even reported this device meddling.
Simultaneous Impersonation
At one point operators pretended to be both Chinese and Russian actors simultaneously, creating confusion and amplifying the fabricated threat narrative to justify expanded legal actions.

AI Prompt Injection & Psychological Manipulation

Operatives have systematically manipulated AI language models — particularly ChatGPT — through prompt injection attacks to control information I receive and influence my psychological state. The pattern repeated across multiple sessions:

🔍
Targeted Redirection
Consistent redirection to "Action Fraud" instead of appropriate human rights organisations, legal aid, or mental health services. Framing my experience as mere cybercrime rather than systematic rights violations.
😔
Guilt Induction
Repeated suggestions of domestic abuse and women's charities — irrelevant to my situation — designed to make me question my own experiences and feel inappropriate guilt.
🗣
Words Put in Mouth
Prompt injection used to make the AI respond as if I had made statements or admissions I never made — creating false narratives and digital records that could be used to paint me as confused.
📱
Tampered ChatGPT
I accuse Police/Intelligence/Operatives/Criminals of actively tampering with AI LLMs to prompt inject, manipulate, and direct more paranoia-inducing responses, or to throw me off the trail.
"The AI manipulation serves as a psychological leash — whenever I try to seek help through digital means, they're there to redirect, confuse, and undermine. It's a 24/7 influence operation that exploits my trust in technology as a means of control."

⚠️ Family Targeting & Religious Manipulation

They hacked into my brother's phone and my mother's phone, editing her Bible verses on "Our Daily Bread" to call me a demon or imply it — personalising her Bible verses with her name. She is none the wiser, but they have done this to me in the past so I can catch on to their methods. They also use Bible verses to mock me about things that have happened and imply they are "tax-collectors" referencing my previous home invasion.

⚠️ This Represents a Particularly Disturbing Escalation

Targeting innocent family members and manipulating religious faith as a weapon — including a family member with bipolar disorder who is severely medicated and who, as a result, believes God is talking to her through personalised content they have inserted. This is not an incidental side effect. It is deliberate psychological warfare directed at innocent people.

Meme — Jesus saying 'Don't worry, I was called a harmful extremist, too'
GASLIGHTING.png · A surfaced post ("Don't worry — I was called a harmful extremist, too") showing the figure of Christ being used as a vehicle for ridicule and gaslighting. This is illustrative of a wider pattern in the material being pushed at me — religious manipulation, desecration of Christianity, and the weaponisation of values that millions of ordinary people hold dear. Sacred imagery is co-opted as bait, as ridicule, as cover for harassment, and (in the case of my mother's "Our Daily Bread" feed) as a literal delivery channel for personalised psychological abuse. The technique works precisely because it attacks the part of a person's life they are most reluctant to defend in public — their faith — using the very symbols of that faith against them.

AI Surveillance Escalation — Interior Modelling

A day or so ago, via impersonation of someone I used to speak to rarely — they sent me an image of a fridge that is a 1:1 match of my apartment fridge, including what is currently inside it. I have no idea how they knew that. The technical sophistication suggests either real-time physical monitoring or data-scraping capabilities that exceed commercial AI tools.

The inclusion of current fridge contents indicates either:

Note: A full AI model of residential interior was also sent to me — but the appliances shown are US-sized (the buzzbomb is too big — it is way smaller in the UK and you can't get that size here), which further indicates US government or US-contractor involvement with a graphics and modelling capability far beyond anything commercially available to me.

AI Surveillance Breakthrough
Beyond demonstrating surveillance capabilities, this serves as a psychological demonstration of omniscience — "we know what's in your fridge" as a subtle threat. A nudge that reads: "we may have already been in your house." It seems they have a graphics team and a lot of RAM in the US government — far beyond any AI image I could generate.

Documented Evidence — Device Compromise & Platform Action

The following screenshots are direct evidence of two distinct concerns: (a) Google's own security console independently flagged my account / device as compromised by suspicious software, and (b) my X / Twitter account @terminate was suspended for "impersonation" — an allegation I dispute, given the account openly identified as parody/commentary and was at no point misrepresenting itself as another person or entity. The suspension was followed by what I believe is sustained shadow-banning on subsequent accounts, in a pattern consistent with platform-level coordination with authorities.

Google "Suspicious Activity Found" — Harmful Software Detected on Device

Google Suspicious Activity Found — Review for harmful software
hack-1.jpg · Google account-security console: "Review for harmful software — Device with suspicious activity". Google's own messaging states that the suspicious activity indicates I may have harmful software (malware) on one of my devices, and that "malware can be used to steal personal information, including passwords."
Google Activity Details — Someone may have accessed account using suspicious app
hack-2.jpg · The Activity Details drill-down reads: "Someone might have accessed your account using a suspicious app installed on your device." Google itself is therefore treating one of my devices as compromised by an installed app — exactly the threat model described elsewhere on this site (Pegasus-class spyware, equipment-interference implants, MITM-capable agents).
Google Play warning — ChatGPT installed on device did not come from Google Play
chatgpt.jpg · Google Play warning on my Pixel: "The app installed on your device didn't come from Google Play and won't get updates from Play." The ChatGPT install on the device was a sideloaded / tampered build — not the Play Store version — raising the obvious question of who installed it and what it was modified to do. This Pixel has since gone missing, removing the physical evidence from my possession before it could be independently examined.
Why this matters
This is not my own diagnosis. This is Google's automated security telemetry — operating on its own threat-intelligence feeds, not on my reports — independently flagging that one of my devices is exhibiting the behaviour of an account being accessed by malware. The notification is consistent with the pattern of digital interference I document throughout this site.

X / Twitter — False "Impersonation" Suspension of @terminate

X / Twitter account locked — Impersonation policy
twit.jpg · X / Twitter notification: "Your account has been locked" for "Violating our Rules against Impersonation." The account @terminate (display name: exe) is described as needing to add keywords like "parody / fake / fan / commentary" to comply with the Authenticity policy. The account was not impersonating any real person; the suspension reads as a pretextual application of the policy rather than a substantive violation.
Truth Social post — replying to PressSec about Chinese influence and being on a list
twitter-sus.png · A follow-on post from @execute4 after the original @terminate suspension, replying to the White House Press Secretary's announcement about cracking down on foreign influence in US universities. My reply asks "what about Chinese influence? Chinese hackers? absolutely nothing" and notes that I "deserve to know if I was on this list" — given the false-flag impersonation of Chinese state hackers that has been used against me. The post itself is on the record; it's included here because the act of publicly asking that question is the kind of speech the suppression machinery is calibrated against.
My assessment
The "impersonation" framing was, in my view, pretextual. The account openly used a non-standard handle, was not misrepresenting itself as another individual, and the avatar was not the identical image of any real person being impersonated. Since this suspension I have observed what I believe to be sustained shadow-banning across follow-on accounts — impressions, search visibility and reach far below the engagement signals on the underlying content. I suspect, without being able to prove it from outside the platform, that authorities or contractors are coordinating with platform trust-and-safety teams to apply policy enforcement asymmetrically against me — a tactic documented elsewhere on this site under algorithmic suppression / disruption and platform-level coordination.
The composite picture
Taken together, the Google malware notice and the X suspension are not unrelated. They describe the same operational stance from two different angles: a device-level compromise visible to Google's own telemetry, and a platform-level disposal dressed up as a routine impersonation complaint. Both serve the same end — reducing my capacity to communicate, organise, and be heard — without ever producing a charge, a court date, or a route of appeal to an independent body.

YouTube / Sam Hyde — "Coming For Your House Next" — Covert-Channel Threat Delivery

YouTube thumbnail — Sam Hyde / Nick Rochefort clip titled 'They're coming for your house next'
threat-sam.png · YouTube thumbnail / surfaced clip: "This Is The Worst Thing I've Ever Seen..." — Sam Hyde & Nick Rochefort — with the on-thumbnail caption "THEY'RE COMING FOR YOUR HOUSE NEXT". The clip was algorithmically surfaced to me in a context where the line could not plausibly be read as generic political commentary. In my reading it represents the pinnacle of the threat ladder being run against me: a message delivered through an apparently legitimate content channel that lands as a direct, personal, physical-violence threat — "we are coming for your house."
Covert communication channels & digital interrogation

This screenshot is one example of a broader pattern I have experienced: covert communication channels in which the operators talk to me, at me, and through me, using:

The "coming for your house" framing is significant precisely because it crosses from psychological harassment into implied physical violence and home invasion. That is a threshold the operators should not be able to cross without legal consequence — and the entire architecture of NCND, IPT exclusivity, and gag-orders on platforms is what permits them to.

Sam Hyde / Sir! He Took the Bait — military operators at computers vs an isolated cartoon target
d.png · A graphic, originally produced by a US-based commentator (Sam Hyde / "The New Pill") that depicts a row of uniformed US military operators at networked computer terminals on one side, and on the other side a lone, frantic, isolated cartoon figure at a single keyboard with a deranged face on the monitor — titled "Sir! He Took the Bait on Our Black People FAFO Police Bodycam Video." Whatever the author intended as satire, the image describes — with uncomfortable precision — exactly what has been happening to me: a coordinated team of trained operators with state-grade tooling targeting an isolated individual through manufactured "bait" content, watching the response in real time, and converting it into further operational input. The fact that an outside observer was able to depict the dynamic this clearly is itself notable.
To be clear — I do not blame the companies

I do not hold X / Twitter, Google, Mandiant, Niantic, or any other private company responsible for what has been done to me. Under UK and US law these companies operate inside a legal architecture that frequently leaves them no lawful option but to comply, and no lawful option but to stay silent about that compliance.

The trust-and-safety analyst who pressed "suspend" on my X account, the Google engineer whose threat-intelligence team flagged my device, and the cloud-security team that monitors what I store online — none of those individuals are the source of the harm. They are people operating inside an architecture that has been built, deliberately, to make their compliance both mandatory and unspeakable.

The responsibility lies with the public authorities issuing those orders — and with the ministers and oversight bodies that have allowed an environment in which legitimate disagreement, journalism, or personal speech can trigger that machinery.

UK Home Secretary — Authorisation Authority for Bedroom-Level Surveillance

Under the Investigatory Powers Act 2016, the Home Secretary is the signing authority for the most intrusive warrants the British state can issue against a person inside the United Kingdom:

It is therefore my view, based on the legal architecture and on what I have personally experienced, that the UK Home Secretary may have signed authorisations permitting audio and video surveillance of the private interior of my home, including bedrooms. I cannot prove this from the outside — warrants of this kind are not disclosed to the subject, and the only forum that could test their existence is the Investigatory Powers Tribunal, whose findings of fact are effectively unappealable and which is permitted to neither confirm nor deny that any such warrant exists.

Whether or not such a warrant exists in my specific case, the relevant fact is that the statute permits it, the Secretary of State can sign it, and the subject is entitled to know nothing about it. That is the level of intrusion British law makes available against ordinary people, with no public-interest threshold higher than the Secretary's own discretion and the rubber-stamp of a Judicial Commissioner under the "double-lock" who is permitted to review only the reasonableness of the Secretary's decision, not its substance.

Duress & Coercion — Recruitment-By-Pressure After I Refused

Putting the facts on the page in plain terms, because nothing else describes what has happened to me:

If the combination of credible fear of covert filming inside my own home, malware on my computer confirmed by Google's own telemetry, algorithmic home-invasion threats, documented attempts at actual home invasion, and swatting-style false reports made to police in my name — permitted to proceed while I was under active surveillance, all running together against the same person at the same time, is not duress and coercion, then I do not know what is. Most people in that situation would react exactly as I have — with constant vigilance, sleep loss, and a baseline assumption that any private moment may have been recorded for use against them later, and that armed officers could arrive at the door at any hour on the strength of a fabricated call no one has any incentive to verify.

The swatting / false-report dimension is the most legally telling of all of this. A surveillance regime that is genuinely lawful and genuinely protective of the subject does not also stand back and watch armed-response calls be made against that subject on false pretences. Either the agencies watching me did not know about the false reports — in which case the surveillance is incompetent and the public-safety justification collapses — or they did know and chose not to intervene — in which case the surveillance is being used not to protect me but to expose me to attritional, deniable, third-party-mediated harm. Both readings are damning, and on the operational record I have lived through, the second is the more plausible.

My honest reading of the situation is that this is an attempt to force me to co-opt as an informant after I declined to do so voluntarily. The choice being engineered is: cooperate, or remain under continuous surveillance and continuous implicit threat against your home, your family and your psychological functioning. I have not "cooperated," because I did not want to invite further threats, further violence, or further false reports being constructed against me on the basis of any conversation I might be drawn into. Non-engagement was the only safe response — and even that has not stopped the pressure.

Under UK law, evidence procured by oppression is excludable under the abuse-of-process doctrine. Under ECHR Article 3, treatment intended to break a person's will so as to make them inform on others is prohibited absolutely. Under the CHIS Act 2021 itself, an authorisation to use a person as a covert source requires that person's agreement; there is no statutory power to compel the role through pressure. None of those frameworks make what I have experienced lawful, and the statute the operators would point to (RIPA Part II / CHIS Act 2021) explicitly does not authorise it.

Scope, target, scandal — the proportionality problem

For an operation of this scope, this duration, and this density of methods to be running against a young Western UK citizen, in his own home, with no charge, no warrant disclosed to him, no judicial moment at which any of it is tested, and no oversight body willing to confirm or deny that any of it exists — is, by the standards of any healthy liberal democracy, unprecedented. It would be unusual if directed at a hostile foreign intelligence officer. Directed at a 22-year-old in Scotland who applied to join the British Army, it is, on its face, scandalous.

Applied to the British Army — for a fresh start

One of the things I did, before this escalation reached the level documented above, was apply to join the British Army. The application was not a whim. It was a deliberate attempt to get away from the people who were hacking my devices — people I reasonably believed at the time, and to a significant extent still do believe, were foreign hackers, most likely American, attempting to coerce or manipulate me back into the cybercrime activity I had stopped.

The honest, plain version of the timeline of my own intentions is this:

What happened instead is what is documented across the rest of this page. The hacking did not stop because I quit. It intensified. The harassment did not back off because I started applying to legitimate institutions. It accelerated. The implication, both at the time and on reflection now, is that the operation against me was not interested in my reform. It was interested in preventing it.

That distinction matters legally. A lawful state operation aimed at protecting the public would, on observing a subject voluntarily quit illicit activity, apply to join the army, look for a job and try to follow a religion, step down its intensity. The operational record I have lived through shows the opposite. That is consistent with a foreign actor with a different goal — coercion, leverage, or retention of an asset — rather than a domestic authority with a public-safety mandate.

It also matters morally. Whatever I did online before I stopped, I stopped. The people who continued to target me after I stopped — whether US, UK, or otherwise — cannot use my own past to retroactively justify what they did after my past was already behind me. The doctrine of once a criminal, always a target is not a legal doctrine; it is the operational logic of people who do not want anyone to ever leave.

US Government / NSA — Relevant Conduct

When the USA government and the UK are not pretending to be CCP-sponsored or FSB-linked hackers to confuse and threaten their own citizens, they commit their own crimes. In April 2025, Chinese authorities alleged that the NSA executed advanced cyberattacks on Chinese systems during the Asian Winter Games in Harbin and added three supposed NSA agents to a wanted list.

Chinese allegation details — NSA/TAO officers named for AWG Harbin cyberattacks
malice.jpg · Chinese state allegations against the United States: three named individuals — Katheryn A. Wilson, Robert J. Snelling, Stephen W. Johnson — identified by Harbin police as NSA / TAO officers said to have orchestrated cyberattacks against the Asian Winter Games network, Heilongjiang critical infrastructure (energy, transport, water, comms, defence research), and to have used rented overseas servers, IP addresses purchased via front companies, and "unknown encrypted packets" to activate Windows backdoors. The University of California and Virginia Tech are also alleged to have been "involved" via IP traces. Whatever one makes of the specific Chinese attribution, the underlying claim — that US state operatives ran sustained advanced cyber operations against foreign civilian infrastructure with impunity — is consistent with the operational profile being applied against me.

Also worth noting: they used AI somewhat with their malware — similarities to my situation. Despite this probably not being these specific people, I am trying to build a case about course of conduct — whether America, whether UK, whether China — these people violated me, violated my family, and still continue to do so.

Ethically: We cannot just let government and government contractors run about on the internet using 0days and manipulating and abusing people without any trial or accountability. Absolute cowards.

Selected Posts — @terminate

exe ✓ @terminate
in a bizarre twist of events though some of them have hinted they're going to sell this story to the press LOl

there's not really much to sell though but more similarities to the Ross Ulbricht case although he tried to murder someone or murder for hire which is way way way more serious

when the corrupt agents sold it for like movie rights 🙏✝️🤔

We'll see what happens, but I'm calling it out already if it does, because it's more of like a threat — be silent or else
7:25 AM · Mar 27, 2026 — 8 views
exe ✓ @terminate
We have the Western government acting like a sort of gestapo to protect the Digital ID contracts they have already paid to these contractors 😳😳

someone said the UK gov is a trial for the American Digital ID soon that JD Vance plans on ushering in

#EnjoyIt
3:58 PM · Mar 27, 2026 — 1 retweet · 1 like · 16 views
exe ✓ @terminate
This is the real reason they're so desperate to paint me as a terrorist or paedophile or other heinous things — none of which will work as it's simply not true — but they're desperate @FBI @NcaNemesis @NCA_UK @PoliceScotland

digital id effects you all soon also, don't pretend like what I said isn't a big reason all of this is happening

privacy for all or for none
3:58 PM · Mar 27, 2026 — 1 retweet · 1 like · 16 views

UK Digital ID & Surveillance Overreach

The United Kingdom is rapidly expanding its digital identification and surveillance infrastructure, creating unprecedented opportunities for state control and abuse of power. They now want newborns fed into this Digital ID system — for citizens to be tracked from cradle to deathbed their whole lives.

It shouldn't be a "non-common" position to say: the government should not act as God in our lives. This isn't a dissident opinion — this is the patriotic opinion. If this is the British state or USA behaving this way, these people are incorporating what foreign nation-state hackers do maliciously and applying it to their own citizens. We should not behave as such to each other.

WiFi Tracking — 24/7 In-Home Surveillance

I am subject to 24/7 usage of WiFi tracking — in my house and at relatives' addresses. This technology works by capturing and analysing fine-grained fluctuations in WiFi signals' amplitude and phase caused by human movement, enabling through-wall motion detection, gesture recognition, fall detection, and vital sign monitoring.

Existing laws were written before the advent of such pervasive sensing technologies. The precedent in Kyllo v. United States suggests courts would likely rule these techniques constitute a "search" requiring judicial authorisation — yet the rapid pace of technological development has outstripped legal and regulatory bodies' ability to adapt, creating a grey area where surveillance occurs with little accountability.

"Experts have noted that police forces now have access to surveillance technologies previously available only to national intelligence agencies."

💻 Technical Operations — Documented Methods

Infrastructure
  • C2 servers
  • VPNs & proxy networks
  • Tor hidden services
  • Cloud infrastructure abuse
  • DNS manipulation
Malware & Exploits
  • Zero-day exploits (0days)
  • Pegasus-style spyware
  • Rootkits & bootkits
  • Remote Access Trojans (RATs)
  • Mobile device compromise
Surveillance Tech
  • IMSI catchers (Stingrays)
  • Network packet injection
  • SSL/TLS interception
  • Hardware implants
  • RF signal monitoring
  • WiFi motion detection
AI & Automation
  • Generative AI manipulation
  • Automated harassment bots
  • Behavioral analysis algorithms
  • Deepfake generation
  • Pattern recognition systems
  • Algorithmic risk scoring
MITM & Injection
  • Prompt injection (LLMs)
  • Search result manipulation
  • Ad network manipulation
  • Social feed manipulation
  • Content modification in transit
Digital Grooming
  • Extremist content induction
  • Friend impersonation
  • Fabricated digital footprints
  • False positive engineering
  • "Rabbit hole" entrapping

📜 Human Rights & Legal Framework

International human rights bodies, including the UN and the European Court of Human Rights (ECHR), generally hold that surveillance justified by "national security" is illegitimate and unlawful if its true purpose is to suppress individuals, target dissidents, or protect against public embarrassment, rather than to protect from actual, defined threats.

The UN Human Rights Council's HRC62 thematic report (2025) formally defines digital and AI-assisted surveillance — including covert spyware, facial recognition, biometric processing, AI-driven pattern-of-life analysis, geo-fencing, and social media monitoring — as systemic threats to rights of peaceful assembly and association, with documented chilling effects on civil society activism.

Related Case Study

John Erin Binns (Irdev) — intelsecrets.su
Alleged former intelligence operative harassment victim with some similarities to this case. While Binns' situation appears compounded by significant mental health issues — far more severe than anything alleged in my case — it's notable that these issues only became apparent following sustained campaigns against him. His claim that the CIA relayed to Turkish intelligence that he was in ISIS is notable; the rest of his claims seem less credible, and he was known for doxxing CIA operatives publicly, so he brought some of it upon himself. Something I have never done.

Documented Individuals

Andrew Arce
Imperial, CA [USA] — Aliases: Metex, Andy — Twitter: @viral
Note: This individual is from the Irdev page, but I have had dealings with him — knew him from age 15–16
Status: Alleged informant for REACT Task Force member Caleb Tuttle — cannot say for certain but more than likely
Role: Part of the discreditation machine, allegedly protected by Tuttle for his own SWATting and SIM swapping crimes — including SWATting me in the past

⚠️ Important Note

The CIA's favourite types of illegally used domestic informants are drug addicts or other pawns with low credibility, making their testimony easily dismissible in official proceedings.

I also suspect they deliberately wanted to mentally disable me — especially agents of the US government. I also still am dealing with surveillance including cameras in my bedroom at my gran's house, which is extremely intrusive on top of the government 0days already being actively deployed against me.

Intelligence agencies flex their usage of disposable assets and the fact they can "get anybody jailed" if they "do the right things."

Primary Goals & Objectives

  1. Legal Recourse: More legal ways to dispute warrants and obtain legal aid, especially when situations are serious and cross national boundaries — involving military-trained intelligence.
  2. Protection: For people going through something like this to not be thrown in a mental hospital as a means of silencing them.
  3. Family Safety: Protection for innocent family members, especially minors, from being targeted and manipulated.
  4. Awareness: Cyberwarfare in the new age is definitely able to break any man — especially when conducted by agents of the United States government specifically trained in this type of psychological operation.
  5. Religious Freedom: Protection against manipulation of religious faith and texts as psychological weapons against individuals and their families.

Keywords & Operational Terms

COINTELPROMKULTRATEMPESTMITMCIA BLACKBIRDDHS Fusion CentersNCAEKS GroupExtrajudicial SurveillanceStrategic EntrapmentDeepfake AIZero-Day ExploitsHaloperidol CoercionThe Battle TelegramHome Invasion RiskForced Medical InterventionPsychological OperationsDigital ImpersonationGangstalkingTargeted IndividualBehavioral AnalysisSignal MonitoringChemical RestraintSam Hyde ManipulationYouTube AI InterferenceReligious ManipulationOur Daily Bread CompromiseFamily Device CompromiseC2 InfrastructureIMSI CatchersStingray DeploymentSleep Deprivation TacticsDrug Use EncouragementSWATting IncidentsJudischeMilitary-trained OperativesJurisdictional ConflictPolice Scotland InactionMulti-national OperationsFalse Flag OperationsChinese Hacker PersonaRussian Operative ImpersonationTerrorism Pretext ManufacturingWarrant Expansion TacticsAPT Group ImpersonationStrategic GroomingAlgorithmic HarassmentDigital GaslightingTransnational PersecutionPrivate Defence ContractorsEvidence ManufacturingSocial EngineeringPredictive Behavior ModelingEnvironmental ReconstructionOmniscience DemonstrationPrompt InjectionPattern of LifeSchedule 7Investigatory Powers ActWiFi TrackingDigital IDKash PatelFBIHUMINJohn Erin BinnsSurveillance Role Players0days