Independent Research & Analysis

The Unseen War

A documented look at surveillance law, state-sponsored cyberweapons, covert influence operations, police corruption, and the intelligence conflict between the United States and China.

What this site covers: All content draws from publicly available sources — court proceedings, federal indictments, declassified reports, parliamentary records, and investigative journalism. This site is educational. No classified material is reproduced here.

Personal Testimony

⚠️
First-Hand Account
My Experience — Cyberwarfare & Psychological Operations
Liam Graham's personal documentation of sustained psychological operations, digital interference, algorithmic manipulation, false flag operations, family targeting, and extrajudicial coercion over 1–2 years.
🕵
Methods & Tactics
Unethical Methods — Documented & Alleged
A detailed breakdown of state and non-state tactics: fake social profiles (FOIA-confirmed), FBI journalist impersonation, MITM webpage modification, sleep deprivation, AI-generated content weapons, digital grooming, and religious manipulation.

UK Surveillance Law

👁
UK Law
UK RIPA & the Investigatory Powers Act
How Britain built one of the most sweeping legal surveillance frameworks in any democracy — bulk interception, equipment interference, spy cops, GCHQ, and documented abuses from councils to MI5.
🛡
Insider Breach
GCHQ & MI5 Scandals
Hasaan Arshad — the Manchester student who walked top-secret files out of GCHQ Cheltenham on his work phone — plus the bulk-data IPT ruling, Katharine Gun, Manchester Arena, and the CHIS Act criminal-conduct authorisations.
🏏
Location Data
Spyware, Spatial Tracking & Pokémon Go
How consumer apps — including Pokémon Go — harvest precision location data at scale, how law enforcement purchases or subpoenas it, and how it is used to profile, intimidate, and threaten.

UK Police Corruption

🔒
Active Trial
Police Scotland: Intelligence Leaked to Gangsters
Two detectives — David Smith and Christopher Dougherty — on trial for leaking top-secret Scottish Intelligence Database records to organised crime, cocaine use on duty, and perverting the course of justice over 12+ years.
NCA / Crypto
NCA: The 50 Bitcoin Theft
Paul Chowles — how 50 Bitcoin was allegedly stolen from a criminal's seized wallet during an NCA investigation, how every internal system failed to detect it, and how independent blockchain analysis caught what the NCA could not.

US Profiling Law

Civil Liberties
California RIPA: Racial & Identity Profiling Act
California's landmark anti-profiling law — what it requires, how it can be weaponized by both government and institutions, and documented cases of loophole exploitation.

US Government — Cyber Arsenal

🔐
Classified Leaks
Military-Grade Cyberweapons
NSA's Tailored Access Operations, EternalBlue, Stuxnet, Vault 7, and PRISM — the documented arsenal of state-sponsored exploits and how they escaped into the wild.
🌐
Geopolitics
The US–China Cyberwar
Volt Typhoon, Salt Typhoon, the OPM breach, Microsoft Exchange compromises — a timeline of the ongoing digital conflict between Washington and Beijing.

China — Covert Operations

👨‍💼
Influence Ops
Compromising Mayors & Local Officials
The CCP's United Front Work Department targets city councils, mayors, and state legislators. Documented FBI cases, federal indictments, and the mechanics of soft-power coercion.
Intelligence
China Executes US Spies — Publicly
Between 2010–2012, China dismantled a CIA network and executed or imprisoned up to 20 assets. The New York Times investigation, the mole hunt, and Beijing's use of public executions as deterrence.

Disclaimer: This website presents information compiled from public reporting, court records, and government documents. It does not endorse any illegal activity. All referenced events are documented in open sources. The purpose is civic education about the intersection of law enforcement policy, national security, and civil liberties.