Cyberwarfare & Targeted Individual Documentation

A record of sustained psychological operations and physical threats (AI models sent to me via Algorithm or Impersonation of Friends/relatives of my Home)

Liam Graham

Date of Birth: 16-09-2003 (Age 22)

Location: Edinburgh, Scotland

Email me if you can:

1. Get me media attention or speak with journalists who are privacy or human rights activists; not just any "journalist"

2. Refer me to a lawyer

Contact: x@humblebr.ag or execute@FreeExe.co.uk

🌐 Jurisdictions & Surveillance Frameworks

🇬🇧
United Kingdom
Schedule 7, Investigatory Powers Act — disproportionate use against activists, to protect "national security" often now but never previously used for cybercrime and hacking -- UK Police said or hinted via PC it was "above their paygrade/level" and they "cannot/will not" do anything to "the Americans"
🇺🇸
United States
FBI informant programs, COINTELPRO-style digital extensions, pattern-of-life analytics. USA has about a 1 cybercriminal to 2 informant ratio in the USA 1:2
🇨🇦
Canada
CSIS & CSE bulk surveillance, metadata exploitation -- French Canadian keyboard connected in my old seized iPhone logs possibly traces of an iPhone exploit or 0day
🇨🇳
China
AI-enabled social credit & mass behavioral profiling (false flag by Western intelligence, if all else fails blame China and get them mentally detained)
🏴󠁧󠁢󠁳󠁣󠁴󠁿
Scotland/UK
Targeted digital harassment, familial interference documented, previous home invasion, break in attempt, kidnapping attempt, extortion attempt + The Battle channel (suspectedly passed information by Police/Intelligence in their campaign "By Any Means Necessary"

[SCOTLAND] Police Scotland Statement: Officers have indicated the situation is "above their paygrade" or that they "cannot/will not do anything to Americans" involved in these operations.

Overview

For the past 1-2 years, I have been dealing with what I can only describe as cyberwarfare—primarily psychological in nature, though I sometimes wonder if it has crossed into physical dimensions.

Due to explicit threats among other concerning developments, I have decided to document this experience publicly. This page will be updated and corrected as additional information becomes available.

Also talking to me through YouTube videos (especially Sam Hyde) or in comments probably using AI with undisclosed government software.

[SCOTLAND] People who I reasonably assume to be Police Scotland officers have said to me it is above their paygrade or do not want/can't do anything to Americans [USA].

I should be allowed to message my family or friends (who are not criminals, when I am not committing any criminal acts nothing) and not have a government agent try and entrap me by sending neo nazi content masquerading as my friend. This isn't just one off—it is strategic over many months to impersonate my friend and slowly over time get me used to such ideas and also use my alias and name to possibly entrap my friend also... (interception/modification/relay).

Evidence of government involvement

It seems they have a graphics team in the US government [USA]

A day or so ago, impersonation of some guy I used to talk rarely though "strips" (not in a couple years at least, 2-3) and they sent me a fridge which is 1:1 of my apartment fridge

AI generated fridge matching my apartment

It seems they have a lot of RAM in the US government [USA] - far beyond any AI image I could make

It's like AI generated but in the fridge is also what I have in my fridge right now... I have no idea how they knew that and how AI is so good.

Full image of AI generated fridge

Full up image

Documenting unlawful state tactics, human rights violations, and the erosion of civil liberties

International human rights bodies, including the UN and the European Court of Human Rights (ECHR), generally hold that surveillance justified by "national security" is illegitimate and unlawful if its true purpose is to suppress individuals, target dissidents, or protect against public embarrassment, rather than to protect from actual, defined threats.

📜 Legitimacy & Purpose: The Pretext Problem

Surveillance must have a legitimate aim, such as public safety or national security. Using surveillance to maintain government reputation or prevent embarrassment does not qualify as a legitimate national security interest. Under international standards, surveillance must be strictly necessary and proportional to a real threat. Excessive surveillance that creates a "chilling effect" on society or targets activists is often viewed as a "police state" tactic rather than a justified defensive measure.

Human rights bodies argue that surveillance is unlawful if its justification is a pretext for suppressing dissenting voices or concealing government misconduct. This principle applies globally, including within democratic nations where emergency powers are routinely abused.

⚠️ Manufactured Justification for Surveillance

In broader contexts (such as in cases of extreme, orchestrated harassment or unlawful intelligence activity), the manufacture of justification for monitoring often includes:

These tactics are designed to leave the victim feeling suicidal, degraded, confused, helpless, and isolated, doubting their own sanity and perceptions. Which is a documented grooming tactic, (un)funnily enough used by 764 as reported in some media or reportsTriangulation: Creating conflict between the target and their loved ones to cause a rift (family life interference).

🌍 Human Rights Council Mandate & AI-Enabled Repression

UN Human Rights Council’s HRC62 thematic report (2025) formally defines digital and AI-assisted surveillance—including covert spyware, facial recognition, biometric processing, AI-driven pattern-of-life analysis, geo-fencing, and social media monitoring—as systemic threats to rights of peaceful assembly and association, with documented ‘chilling effects’ on civil society activism.

Technical Scope Clarified: The report explicitly includes digital grooming as a recognized surveillance modality when deployed by State actors or their non-State facilitators—particularly in contexts involving minors, mental health profiling, and behavioral influence targeting vulnerable populations.

📄 Key UN Documents & Legal Architecture

Legal Architecture Mapping: Chilling effects constitute de facto interference under Article 21 (assembly) and Article 22 (association) of the ICCPR—and digital grooming of minors falls under both the Convention on the Rights of the Child (CRC) and the Istanbul Convention’s definition of gender-based digital violence.

🧠 Trauma Documentation & Psychological Coercion

Trauma & Methodology Alignment Research Initiated: Parallel investigation into clinically documented psychological trauma patterns arising from algorithmic harassment, state-linked digital targeting, and coercive mental health exploitation — with dedicated queries focused on peer-reviewed psychiatry literature (2024–2026), UN Special Rapporteur findings (OHCHR), and academic analyses of AI-enabled COINTELPRO extensions.

Multiple reports (A/HRC/59/41, neurotechnology dignity submission) cite clinical evidence linking persistent AI-powered monitoring to heightened anxiety, hypervigilance, dissociative symptoms, and eroded trust in digital environments—especially among individuals with prior trauma exposure or diagnosed mental health conditions.

Submissions on Disinformation & Neurotechnology: Highlights documented cases of technology-facilitated gender-based psychological coercion and child-device exploitation.

🏛️ Official Denials vs. Operational Reality

The FBI publicly maintains that all operations are legal; for instance, after Jan.6 testimony, FBI officials denied having undercover agents at the Capitol. Thus, while investigators admit to using informants and covert profiles, these incidents are treated as misconduct when revealed, not acknowledged policy. This pattern illustrates the systemic gap between stated accountability and actual pretextual methods.

Parallel to the Ross Ulbricht case: As noted in the X post above, corrupt agents reportedly sold rights to the story—a dynamic where law enforcement misconduct becomes commodified while the underlying surveillance tactics remain opaque. The comparison underscores how pretextual surveillance often overlaps with institutional self-protection and profit motives.

Digital ID Contracts & the "Gestapo" Critique: The posts also highlight concerns about Western governments using surveillance infrastructure—often outsourced to private contractors—to suppress critics under manufactured pretexts. The reference to JD Vance and UK as a "trial" for American Digital ID echoes broader civil liberties warnings about the fusion of commercial and state surveillance.

⚖️ Proportionality, Necessity & Unlawful Surveillance

Under international standards, security measures must be proportionate. Evidence has shown concerns about the overuse of emergency powers (such as Schedule 7 in the UK) to target individuals without "reasonable grounds". International human rights bodies argue that surveillance justified by "national security" is illegitimate if its true purpose is to suppress individuals or protect against public embarrassment, rather than to protect from actual threats.

Unlawful Surveillance: Covert monitoring that lacks judicial oversight or is based on manufactured intelligence violates Articles 17 (privacy) and 19 (expression) of the ICCPR, and constitutes arbitrary interference under international human rights law.

🖥️ Computing & Technical Aspects

The operations against me involve sophisticated computing techniques and technologies:

Infrastructure

  • Command & Control servers (C2)
  • VPNs & Proxy networks
  • Tor hidden services
  • Cloud infrastructure abuse
  • DNS manipulation

Malware & Exploits

  • Zero-day exploits (0days)
  • Pegasus-style spyware
  • Rootkits & bootkits
  • Remote Access Trojans (RATs)
  • Mobile device compromise

Surveillance Tech

  • IMSI catchers (Stingrays)
  • Network packet injection
  • SSL/TLS interception
  • Hardware implants
  • RF signal monitoring

💻 Computing, AI & Exploitation Vectors

📡 AI-Driven Pattern-of-Life

  • Biometric processing
  • Geofencing & real-time tracking
  • Algorithmic risk scoring

🛡️ Covert Spyware

  • Pegasus-style deployments
  • Zero-click exploits
  • Device interference campaigns

🧩 Digital Grooming

  • MITM behavioral influence
  • Extremist content induction
  • Fabricated digital footprints

📊 Data Manipulation

  • False positive engineering
  • Fabricated intelligence reports
  • Social media algorithmic framing

AI & Automation

  • Generative AI manipulation
  • Automated harassment bots
  • Behavioral analysis algorithms
  • Deepfake generation
  • Pattern recognition systems

🔍 Independent Research Initiative

Parallel investigation into clinically documented psychological trauma patterns from algorithmic harassment, state-linked digital targeting, and coercive mental health exploitation — peer-reviewed psychiatry literature (2024–2026), UN Special Rapporteur findings, and academic analyses of AI-enabled COINTELPRO extensions.

⚠️ Family Targeting & Religious Manipulation

They hacked into my 11-year-old brother's phone (who is now 12) who stays at a different house with my mother. They also hacked my mother's phone and edit her Bible verses on "Our Daily Bread" to call me a demon (or imply it) and personalize her Bible verses with her name "Emily."

She is none the wiser but they have done this to me in the past, so I can catch on to their methods.

Example of manipulated content:
"Emily, [don't have example, do not ask my family about it only what they tell me do not want to scare/or sound paranoid or ruin already strained relationships due to this]."

They also use Bible verses to mock me about things that have happened and say or imply that they are "tax-collectors" talking about my previous home invasion.

Family Targeting Methods:

  • Brother's Phone: Hacked when he was 11, now 12 years old
  • Mother's Phone: Compromised and monitored
  • Religious Manipulation: Bible app content altered to target me
  • Personalization: Content tailored using her name "Emily" due to her having "Bipolar" disorder severely medicated now believes God is talking to her...
  • Psychological Warfare: Using religious texts to create family discord
Bible/religious manipulation evidence

Bible/religious manipulation

This represents a particularly disturbing escalation—targeting innocent family members including a child, and manipulating religious faith as a weapon.

⚠️ Important Note on Mental Health Impact

Due to these extrajudicial tactics—which have likely never been used on anyone else in this manner—I have suffered multiple documented mental breakdowns following initial contact with these entities.

Also during this psychological operation and MiTM (even if done by a warrant or a judge), these people also sent me a lot of things deliberately to entrap or out of pure malice/hatred for me I believe specifically:

  • Video on how to inject heroin
  • Pushing me to try and do Crystal Meth
  • Other things (cannot discuss fully without a lawyer but these are some types of things, it is worse though)

These breakdowns occurred only after sustained psychological operations were initiated against me by possibly military-trained level operatives from [USA][UK] and potentially other involved countries.

Related Case Study

John Erin Binns (Irdev)

Alleged former gang stalking victim with some similarities to this case. While Binns' situation appears compounded by significant mental health issues—far more severe than anything alleged in my case—it's notable that these issues only became apparent following sustained campaigns against him.

IMPORTANT NOTE

The CIA's favorite types of illegally used domestic informants are drug addicts or other pawns with low credibility, making their testimony easily dismissible in official proceedings.

I also suspect they deliberately wanted to mentally disable me over these periods especially agents of the [USA] US government. I also still am dealing with Surveillance including cameras in my bedroom at my grans house which is a bit extremely intrusive ontop of the government 0days already being actively deployed against me.

Documented Individuals

Andrew Arce

NOTE: This guy is from Irdev page, but I have had dealings with him if he is intelligence - I knew him from age 15-16
From: Imperial, CA [USA]
Aliases: Metex, Andy
Status: Informant for REACT Task Force member Caleb Tuttle (allegedly) cannot say for sure but more than likely
Role: Part of the discreditation machine, protected by Tuttle for his own SWATting and SIM swapping crimes - including also swatting me in past
Twitter: @viral

Documented Individuals

Unnamed suspected operator #1

x x
From: ?? [USA]
Aliases: Unnamed suspected operator #1 (as of 05/02/2025)
Status: Unnamed suspected operator #1
x:Unnamed suspected operator #1

Keywords & Terminology

FBI [USA] Gangstalking Kash Patel National Crime Agency Algorithm AI Artificial Intelligence Manipulation Artificial Intelligence Deepfake Suicidal Encouragement Entrapment HUMIN BLACKBIRD CIA Codename BLACKBIRD John Erin Binns TEMPEST Monitoring TEMPEST Surveillance Role Players EKS Group COINTELPRO MITM Isolation Grooming Extrajudicial Extrajudicially 0days Threats AI Models of House Impersonation of Friends/Family Religious Manipulation Family Targeting Child Targeting Police Scotland [SCOTLAND] False Flag - POTENTIALLY [CANADA][CHINA] C2 Servers VPN/Proxy Networks Zero-day Exploits Pegasus Spyware Rootkits RATs IMSI Catchers SSL/TLS Interception Hardware Implants RF Monitoring Generative AI Automated Bots Behavioral Analysis Deepfakes Pattern Recognition Command & Control DNS Manipulation Cloud Infrastructure Tor Networks Packet Injection Mobile Compromise

Primary Goals & Objectives

1. Legal Recourse: More legal ways to dispute warrants or more oversight to complain that is more easily available and readily accessible across jurisdictions ([SCOTLAND][UK][USA]).

2. Protection: For people who are going through something like this to not be thrown in a mental hospital.

3. Family Safety: Protection for innocent family members, especially minors, from being targeted and manipulated.

4. Awareness: Cyberwarfare in the new age is definitely able to break any man, especially agents of the United States government [USA] who were trained specifically in this type of psychological operation.

5. Religious Freedom: Protection against manipulation of religious faith and texts as psychological weapons.

This document represents personal experiences and observations. Information is presented as accurately as possible given the circumstances.

Documented by: Liam Graham | Twitter: @terminate | Edinburgh, Scotland

Last updated: December 2025