← Back to Index

Personal Testimony / Cyberwarfare / Psychological Operations

Experience — Cyberwarfare & Targeted Operations

Documentation of sustained psychological operations, digital interference, surveillance, algorithmic manipulation, extrajudicial actions, and coercion. A personal record by Liam Graham — Edinburgh, Scotland.

Edinburgh, Scotland Psychological Operations Cyberwarfare Human Rights
What this page is: A personal, first-hand account of sustained cyberwarfare, algorithmic manipulation, threats, coercion, and extrajudicial conduct experienced over approximately 1–2 years. Documented publicly because transparency is the only available protection. This page will be updated as additional information becomes available. All information is presented as personal experience and observation — without forensic analysis it is difficult to attribute with certainty, but that does not mean it did not happen.

About

Liam Graham ~ exe 🙏
Edinburgh, Scotland — Age 22 (DOB: 16-09-2003)
Location Edinburgh, Scotland
Twitter / X @terminate — falsely suspended 🙏 — Bluesky: @execute4
Substack @execute4 — articles worth a read
Truth Social @execute4
Jurisdiction Edinburgh, Scotland — MLAT applicable; possible international/Canadian 0day involvement

Overview & Background

For the past 1–2 years I have been dealing with what I can only describe as cyberwarfare — primarily psychological in nature, though with increasingly physical dimensions that blur the boundary between digital and real-world harassment.

Due to explicit threats and other concerning developments, I have decided to document this experience publicly. I applied to join the army before I was ever arrested. I quit all my activities when this started happening. I'm trying to stay out of trouble, study, and get a job — I honestly don't deserve this, and nobody does.

Important: No interaction with police in real life has ever been bad — only digitally. Because digital they believe gives them plausible deniability, in my opinion. Keep that in mind when reading these allegations, especially regarding the haloperidol threats — no officer ever came up to me in person and said anything. It was always through digital means — algorithm, prompt injection, or manipulated search results.

Police Scotland Statement
Individuals I reasonably identify as Police Scotland officers have stated the situation is "above their paygrade" or that they "cannot/will not do anything to Americans" involved in these operations. It seems the once British Empire has been reduced to American lapdogs, watching Americans toy with me and my family.

🌐 Jurisdictions & Surveillance Frameworks

🇬🇧
United Kingdom
Schedule 7, Investigatory Powers Act — disproportionate use against activists. UK Police hinted via PC it was "above their paygrade" and they "cannot/will not" do anything to "the Americans."
🇺🇸
United States
FBI informant programs, COINTELPRO-style digital extensions, pattern-of-life analytics. Approximately 1 cybercriminal to 2 informant ratio in the USA.
🇨🇦
Canada
CSIS & CSE bulk surveillance, metadata exploitation. French Canadian keyboard connected in old seized iPhone logs — possibly traces of an iPhone exploit or 0day.
🇨🇳
China (False Flag)
AI-enabled social credit & mass behavioral profiling — used as false flag by Western intelligence. "If all else fails blame China and get them mentally detained."
🏴&#uDB40;&#uDC67;&#uDB40;&#uDC62;&#uDB40;&#uDC73;&#uDB40;&#uDC63;&#uDB40;&#uDC74;&#uDB40;&#uDC7F;
Scotland/UK
Targeted digital harassment, familial interference, previous home invasion, break-in attempt, kidnapping attempt, extortion attempt, and The Battle channel — suspects passed information by Police/Intelligence.

Core Allegations — Digital Operations

Malware & Traffic Rerouting

Police Scotland malware consistently re-routes all my traffic through Glasgow or Western Scotland-based IP addresses. I consistently notice Glasgow as my location when using Google or Gmail — even without a VPN — so they are clearly rerouting traffic through custom-built, custom-designed Police Scotland malware. We need to know the full extent and capabilities of this if my case is to proceed. This is serious, military-grade malware.

Algorithmic Manipulation & Malicious Advertising

They have also utilised what I suspect to be AI custom-generated advertisements, or malicious adware, designed to cause fear or distress. When I am clean off drugs they will promote #drugtwt or similar on X — something I have never seen before. This is extremely dangerous behaviour. Even some of the ads they have been promoting are distressing and not normal — people say ads are what you look for, but in this case definitely not. They have been manipulating it for a long time.

Claude AI sometimes says "this prompt is dangerous" — so it can and does detect their prompt injection. Any good lawyer is going to eat these people up.

Isolation Tactics

Police/Intelligence/Operatives/Criminals have utilised tactics such as isolation from support networks — friends, family. This includes impersonation of individuals I know, then acting as if those individuals were responsible for the hacking and rights violations committed against me. This is a documented police tactic — not just interrogating two people separately and claiming each is informing on the other, but actively impersonating people digitally and directing blame onto them. I believe through the algorithm they told me to "pin it all on Luke" — so they are probably doing the same with him and others, and even incentivising lying.

Indirect Threats & Medical Coercion

Law enforcement officers have made indirect threats regarding forced medical intervention — specifically referencing the administration of haloperidol against my wishes. They seem to want to bait me into getting myself detained by mental health services. The social media posts — including news articles but usually prompt injection on Grok, Claude, Gemini, and ChatGPT — are sometimes edited real posts, sometimes clearly fake. I will report them and get back a message saying the post or advertisement "never even existed" — so this is a problem, as it may be at the network level.

"Officers/Agents nudged or suggested they would have me put on haloperidol during interactions on my computer via algorithm or prompt injection, claiming it would 'resolve the situation' and that I 'need chemical restraint more than legal counsel.'"

These people never mentioned my mental health until after I neither confirmed nor denied whether I would co-operate with them. They gave me a number to ring; I ignored it. Since then they seem to have increased a vendetta. This constitutes a direct threat of non-consensual medical treatment, violating fundamental human rights and medical ethics. Whether directly or indirectly, they seek to undermine my credibility despite having tried to make me an informant — and now being vengeful since I refused. This directly shows they believe I am credible when I am sober and thinking clearly.

Attempt to Discredit
They want me to stop talking. They are subtly threatening me, thinking I don't have anything — that they can discredit me via mental health and drug usage. But over time everything I have said will come true. I have faith. I will never bow down to these intelligence agencies or police.

COINTELPRO-Style Campaign Analysis

I became the victim of a COINTELPRO-style counterintelligence stalking campaign by federal agencies (DHS/FBI/CIA) and their private defence contractors, reminiscent of MKULTRA methodologies. These entities treat my life like a game, manipulating and stirring conflicts depending on their operational objectives.

What began as overt harassment evolved into a sophisticated psychological operation where some operatives attempted to position themselves as mentors or coaches — a tactic now recognised as strategic grooming, designed to establish control and dependency while simultaneously undermining my ability to seek legitimate help.

Although my drug usage (cocaine, amphetamine, adderall, weed) is problematic — before Police/Intelligence/Operatives/Criminals involvement I never had any psychotic breaks. Only due to their threats, coercion, and malware have I become like this.

🏛
Federal Agency Involvement
Documented coordination between DHS, FBI, and CIA elements with private defence contractors operating in legal grey zones with minimal oversight.
🧪
MKULTRA Parallels
Psychological manipulation techniques mirroring historical MKULTRA programs, including sleep deprivation, gaslighting, and induced paranoia.
🎭
Strategic Grooming
Operatives adopting "mentor" personas to establish trust while simultaneously undermining autonomy — a classic counterintelligence disorientation tactic.
💹
Legal Barrier
Unable to obtain adequate legal representation due to concurrent charges that appear strategically timed to limit defence capabilities.

Telegram Channel "The Battle" — Doxxing & Physical Threat Risk

Authorities have permitted — and potentially facilitated — the operation of a Telegram channel called "The Battle" which has systematically published my personal information and that of my family members.

"The Battle channel has disseminated residential addresses, family member details, vehicle information, and daily routines — information that authorities knew or should have known would be used to facilitate home invasions and attempted kidnappings."

This reckless endangerment has directly resulted in:

Critical Escalation Pattern
The campaign demonstrates a clear pattern: digital harassment → doxxing → physical threats → extortion attempts → AI surveillance modelling. Each phase has been met with institutional inaction, suggesting either coordination or calculated indifference designed to maximise psychological impact while maintaining plausible deniability. The campaign has now escalated to include AI-generated models of relatives' houses — demonstrating surveillance capabilities and psychological warfare techniques designed to signal omniscience and create fear of physical violence.

False Flag Operations & Coercive Tactics

Following sustained harassment and threats, operators engaged in elaborate false flag operations — pretending to be foreign actors to coerce me and create pretext for expanded legal warrants. They also used "kompromat"-style material including medical records, psychiatrist records, botched medical operations, and social worker records — designed to humiliate and threaten to leak these private details completely unrelated to any investigation. This is more intrusive than the Vastaamo data breach, and extends to my family and innocent, underage relatives whose devices have been compromised.

"Agents pretended to be Chinese hackers, then Russian operatives, then both simultaneously — creating a fabricated narrative that I was involved with or assisting foreign terrorist entities. This was clearly designed to manufacture justification for wider surveillance warrants and increase psychological pressure through the implication of serious terrorism charges."

I will always be a Scottish national before anything.

🇨🇳
Chinese Hacker Persona
Initial impersonation of Chinese state actors using language patterns and technical signatures associated with APT groups. Created false narrative of foreign cyber espionage involvement.
🇷🇺
Russian Operative Persona
Subsequent shift to Russian intelligence persona incorporating Orthodox Christianity promotion via algorithm. Designed to create terrorism-related pretexts. I am Protestant — I even reported this device meddling.
Simultaneous Impersonation
At one point operators pretended to be both Chinese and Russian actors simultaneously, creating confusion and amplifying the fabricated threat narrative to justify expanded legal actions.

AI Prompt Injection & Psychological Manipulation

Operatives have systematically manipulated AI language models — particularly ChatGPT — through prompt injection attacks to control information I receive and influence my psychological state. The pattern repeated across multiple sessions:

🔍
Targeted Redirection
Consistent redirection to "Action Fraud" instead of appropriate human rights organisations, legal aid, or mental health services. Framing my experience as mere cybercrime rather than systematic rights violations.
😔
Guilt Induction
Repeated suggestions of domestic abuse and women's charities — irrelevant to my situation — designed to make me question my own experiences and feel inappropriate guilt.
🗣
Words Put in Mouth
Prompt injection used to make the AI respond as if I had made statements or admissions I never made — creating false narratives and digital records that could be used to paint me as confused.
📱
Tampered ChatGPT
I accuse Police/Intelligence/Operatives/Criminals of actively tampering with AI LLMs to prompt inject, manipulate, and direct more paranoia-inducing responses, or to throw me off the trail.
"The AI manipulation serves as a psychological leash — whenever I try to seek help through digital means, they're there to redirect, confuse, and undermine. It's a 24/7 influence operation that exploits my trust in technology as a means of control."

⚠️ Family Targeting & Religious Manipulation

They hacked into my brother's phone and my mother's phone, editing her Bible verses on "Our Daily Bread" to call me a demon or imply it — personalising her Bible verses with her name. She is none the wiser, but they have done this to me in the past so I can catch on to their methods. They also use Bible verses to mock me about things that have happened and imply they are "tax-collectors" referencing my previous home invasion.

⚠️ This Represents a Particularly Disturbing Escalation

Targeting innocent family members and manipulating religious faith as a weapon — including a family member with bipolar disorder who is severely medicated and who, as a result, believes God is talking to her through personalised content they have inserted. This is not an incidental side effect. It is deliberate psychological warfare directed at innocent people.

AI Surveillance Escalation — Interior Modelling

A day or so ago, via impersonation of someone I used to speak to rarely — they sent me an image of a fridge that is a 1:1 match of my apartment fridge, including what is currently inside it. I have no idea how they knew that. The technical sophistication suggests either real-time physical monitoring or data-scraping capabilities that exceed commercial AI tools.

The inclusion of current fridge contents indicates either:

Note: A full AI model of residential interior was also sent to me — but the appliances shown are US-sized (the buzzbomb is too big — it is way smaller in the UK and you can't get that size here), which further indicates US government or US-contractor involvement with a graphics and modelling capability far beyond anything commercially available to me.

AI Surveillance Breakthrough
Beyond demonstrating surveillance capabilities, this serves as a psychological demonstration of omniscience — "we know what's in your fridge" as a subtle threat. A nudge that reads: "we may have already been in your house." It seems they have a graphics team and a lot of RAM in the US government — far beyond any AI image I could generate.

US Government / NSA — Relevant Conduct

When the USA government and the UK are not pretending to be CCP-sponsored or FSB-linked hackers to confuse and threaten their own citizens, they commit their own crimes. In April 2025, Chinese authorities alleged that the NSA executed advanced cyberattacks on Chinese systems during the Asian Winter Games in Harbin and added three supposed NSA agents to a wanted list.

Also worth noting: they used AI somewhat with their malware — similarities to my situation. Despite this probably not being these specific people, I am trying to build a case about course of conduct — whether America, whether UK, whether China — these people violated me, violated my family, and still continue to do so.

Ethically: We cannot just let government and government contractors run about on the internet using 0days and manipulating and abusing people without any trial or accountability. Absolute cowards.

Selected Posts — @terminate

exe ✓ @terminate
in a bizarre twist of events though some of them have hinted they're going to sell this story to the press LOl

there's not really much to sell though but more similarities to the Ross Ulbricht case although he tried to murder someone or murder for hire which is way way way more serious

when the corrupt agents sold it for like movie rights 🙏✝️🤔

We'll see what happens, but I'm calling it out already if it does, because it's more of like a threat — be silent or else
7:25 AM · Mar 27, 2026 — 8 views
exe ✓ @terminate
We have the Western government acting like a sort of gestapo to protect the Digital ID contracts they have already paid to these contractors 😳😳

someone said the UK gov is a trial for the American Digital ID soon that JD Vance plans on ushering in

#EnjoyIt
3:58 PM · Mar 27, 2026 — 1 retweet · 1 like · 16 views
exe ✓ @terminate
This is the real reason they're so desperate to paint me as a terrorist or paedophile or other heinous things — none of which will work as it's simply not true — but they're desperate @FBI @NcaNemesis @NCA_UK @PoliceScotland

digital id effects you all soon also, don't pretend like what I said isn't a big reason all of this is happening

privacy for all or for none
3:58 PM · Mar 27, 2026 — 1 retweet · 1 like · 16 views

UK Digital ID & Surveillance Overreach

The United Kingdom is rapidly expanding its digital identification and surveillance infrastructure, creating unprecedented opportunities for state control and abuse of power. They now want newborns fed into this Digital ID system — for citizens to be tracked from cradle to deathbed their whole lives.

It shouldn't be a "non-common" position to say: the government should not act as God in our lives. This isn't a dissident opinion — this is the patriotic opinion. If this is the British state or USA behaving this way, these people are incorporating what foreign nation-state hackers do maliciously and applying it to their own citizens. We should not behave as such to each other.

WiFi Tracking — 24/7 In-Home Surveillance

I am subject to 24/7 usage of WiFi tracking — in my house and at relatives' addresses. This technology works by capturing and analysing fine-grained fluctuations in WiFi signals' amplitude and phase caused by human movement, enabling through-wall motion detection, gesture recognition, fall detection, and vital sign monitoring.

Existing laws were written before the advent of such pervasive sensing technologies. The precedent in Kyllo v. United States suggests courts would likely rule these techniques constitute a "search" requiring judicial authorisation — yet the rapid pace of technological development has outstripped legal and regulatory bodies' ability to adapt, creating a grey area where surveillance occurs with little accountability.

"Experts have noted that police forces now have access to surveillance technologies previously available only to national intelligence agencies."

💻 Technical Operations — Documented Methods

Infrastructure
  • C2 servers
  • VPNs & proxy networks
  • Tor hidden services
  • Cloud infrastructure abuse
  • DNS manipulation
Malware & Exploits
  • Zero-day exploits (0days)
  • Pegasus-style spyware
  • Rootkits & bootkits
  • Remote Access Trojans (RATs)
  • Mobile device compromise
Surveillance Tech
  • IMSI catchers (Stingrays)
  • Network packet injection
  • SSL/TLS interception
  • Hardware implants
  • RF signal monitoring
  • WiFi motion detection
AI & Automation
  • Generative AI manipulation
  • Automated harassment bots
  • Behavioral analysis algorithms
  • Deepfake generation
  • Pattern recognition systems
  • Algorithmic risk scoring
MITM & Injection
  • Prompt injection (LLMs)
  • Search result manipulation
  • Ad network manipulation
  • Social feed manipulation
  • Content modification in transit
Digital Grooming
  • Extremist content induction
  • Friend impersonation
  • Fabricated digital footprints
  • False positive engineering
  • "Rabbit hole" entrapping

📜 Human Rights & Legal Framework

International human rights bodies, including the UN and the European Court of Human Rights (ECHR), generally hold that surveillance justified by "national security" is illegitimate and unlawful if its true purpose is to suppress individuals, target dissidents, or protect against public embarrassment, rather than to protect from actual, defined threats.

The UN Human Rights Council's HRC62 thematic report (2025) formally defines digital and AI-assisted surveillance — including covert spyware, facial recognition, biometric processing, AI-driven pattern-of-life analysis, geo-fencing, and social media monitoring — as systemic threats to rights of peaceful assembly and association, with documented chilling effects on civil society activism.

Related Case Study

John Erin Binns (Irdev) — intelsecrets.su
Alleged former intelligence operative harassment victim with some similarities to this case. While Binns' situation appears compounded by significant mental health issues — far more severe than anything alleged in my case — it's notable that these issues only became apparent following sustained campaigns against him. His claim that the CIA relayed to Turkish intelligence that he was in ISIS is notable; the rest of his claims seem less credible, and he was known for doxxing CIA operatives publicly, so he brought some of it upon himself. Something I have never done.

Documented Individuals

Andrew Arce
Imperial, CA [USA] — Aliases: Metex, Andy — Twitter: @viral
Note: This individual is from the Irdev page, but I have had dealings with him — knew him from age 15–16
Status: Alleged informant for REACT Task Force member Caleb Tuttle — cannot say for certain but more than likely
Role: Part of the discreditation machine, allegedly protected by Tuttle for his own SWATting and SIM swapping crimes — including SWATting me in the past

⚠️ Important Note

The CIA's favourite types of illegally used domestic informants are drug addicts or other pawns with low credibility, making their testimony easily dismissible in official proceedings.

I also suspect they deliberately wanted to mentally disable me — especially agents of the US government. I also still am dealing with surveillance including cameras in my bedroom at my gran's house, which is extremely intrusive on top of the government 0days already being actively deployed against me.

Intelligence agencies flex their usage of disposable assets and the fact they can "get anybody jailed" if they "do the right things."

Primary Goals & Objectives

  1. Legal Recourse: More legal ways to dispute warrants and obtain legal aid, especially when situations are serious and cross national boundaries — involving military-trained intelligence.
  2. Protection: For people going through something like this to not be thrown in a mental hospital as a means of silencing them.
  3. Family Safety: Protection for innocent family members, especially minors, from being targeted and manipulated.
  4. Awareness: Cyberwarfare in the new age is definitely able to break any man — especially when conducted by agents of the United States government specifically trained in this type of psychological operation.
  5. Religious Freedom: Protection against manipulation of religious faith and texts as psychological weapons against individuals and their families.

Keywords & Operational Terms

COINTELPROMKULTRATEMPESTMITMCIA BLACKBIRDDHS Fusion CentersNCAEKS GroupExtrajudicial SurveillanceStrategic EntrapmentDeepfake AIZero-Day ExploitsHaloperidol CoercionThe Battle TelegramHome Invasion RiskForced Medical InterventionPsychological OperationsDigital ImpersonationGangstalkingTargeted IndividualBehavioral AnalysisSignal MonitoringChemical RestraintSam Hyde ManipulationYouTube AI InterferenceReligious ManipulationOur Daily Bread CompromiseFamily Device CompromiseC2 InfrastructureIMSI CatchersStingray DeploymentSleep Deprivation TacticsDrug Use EncouragementSWATting IncidentsJudischeMilitary-trained OperativesJurisdictional ConflictPolice Scotland InactionMulti-national OperationsFalse Flag OperationsChinese Hacker PersonaRussian Operative ImpersonationTerrorism Pretext ManufacturingWarrant Expansion TacticsAPT Group ImpersonationStrategic GroomingAlgorithmic HarassmentDigital GaslightingTransnational PersecutionPrivate Defence ContractorsEvidence ManufacturingSocial EngineeringPredictive Behavior ModelingEnvironmental ReconstructionOmniscience DemonstrationPrompt InjectionPattern of LifeSchedule 7Investigatory Powers ActWiFi TrackingDigital IDKash PatelFBIHUMINJohn Erin BinnsSurveillance Role Players0days