About
🙏 Support — Any Amount Helps
Anything received goes strictly to legal fees or basic necessities. I may be getting de-banked. I've decided to keep this site up because it is the truth — and it is better than being a coward and deleting it.
Overview & Background
For the past 1–2 years I have been dealing with what I can only describe as cyberwarfare — primarily psychological in nature, though with increasingly physical dimensions that blur the boundary between digital and real-world harassment.
Due to explicit threats and other concerning developments, I have decided to document this experience publicly. I applied to join the army before I was ever arrested. I quit all my activities when this started happening. I'm trying to stay out of trouble, study, and get a job — I honestly don't deserve this, and nobody does.
Important: No interaction with police in real life has ever been bad — only digitally. Because digital they believe gives them plausible deniability, in my opinion. Keep that in mind when reading these allegations, especially regarding the haloperidol threats — no officer ever came up to me in person and said anything. It was always through digital means — algorithm, prompt injection, or manipulated search results.
🌐 Jurisdictions & Surveillance Frameworks
Core Allegations — Digital Operations
Malware & Traffic Rerouting
Police Scotland malware consistently re-routes all my traffic through Glasgow or Western Scotland-based IP addresses. I consistently notice Glasgow as my location when using Google or Gmail — even without a VPN — so they are clearly rerouting traffic through custom-built, custom-designed Police Scotland malware. We need to know the full extent and capabilities of this if my case is to proceed. This is serious, military-grade malware.
Algorithmic Manipulation & Malicious Advertising
They have also utilised what I suspect to be AI custom-generated advertisements, or malicious adware, designed to cause fear or distress. When I am clean off drugs they will promote #drugtwt or similar on X — something I have never seen before. This is extremely dangerous behaviour. Even some of the ads they have been promoting are distressing and not normal — people say ads are what you look for, but in this case definitely not. They have been manipulating it for a long time.
Claude AI sometimes says "this prompt is dangerous" — so it can and does detect their prompt injection. Any good lawyer is going to eat these people up.
Isolation Tactics
Police/Intelligence/Operatives/Criminals have utilised tactics such as isolation from support networks — friends, family. This includes impersonation of individuals I know, then acting as if those individuals were responsible for the hacking and rights violations committed against me. This is a documented police tactic — not just interrogating two people separately and claiming each is informing on the other, but actively impersonating people digitally and directing blame onto them. I believe through the algorithm they told me to "pin it all on Luke" — so they are probably doing the same with him and others, and even incentivising lying.
Indirect Threats & Medical Coercion
Law enforcement officers have made indirect threats regarding forced medical intervention — specifically referencing the administration of haloperidol against my wishes. They seem to want to bait me into getting myself detained by mental health services. The social media posts — including news articles but usually prompt injection on Grok, Claude, Gemini, and ChatGPT — are sometimes edited real posts, sometimes clearly fake. I will report them and get back a message saying the post or advertisement "never even existed" — so this is a problem, as it may be at the network level.
"Officers/Agents nudged or suggested they would have me put on haloperidol during interactions on my computer via algorithm or prompt injection, claiming it would 'resolve the situation' and that I 'need chemical restraint more than legal counsel.'"
These people never mentioned my mental health until after I neither confirmed nor denied whether I would co-operate with them. They gave me a number to ring; I ignored it. Since then they seem to have increased a vendetta. This constitutes a direct threat of non-consensual medical treatment, violating fundamental human rights and medical ethics. Whether directly or indirectly, they seek to undermine my credibility despite having tried to make me an informant — and now being vengeful since I refused. This directly shows they believe I am credible when I am sober and thinking clearly.
COINTELPRO-Style Campaign Analysis
I became the victim of a COINTELPRO-style counterintelligence stalking campaign by federal agencies (DHS/FBI/CIA) and their private defence contractors, reminiscent of MKULTRA methodologies. These entities treat my life like a game, manipulating and stirring conflicts depending on their operational objectives.
What began as overt harassment evolved into a sophisticated psychological operation where some operatives attempted to position themselves as mentors or coaches — a tactic now recognised as strategic grooming, designed to establish control and dependency while simultaneously undermining my ability to seek legitimate help.
Although my drug usage (cocaine, amphetamine, adderall, weed) is problematic — before Police/Intelligence/Operatives/Criminals involvement I never had any psychotic breaks. Only due to their threats, coercion, and malware have I become like this.
Telegram Channel "The Battle" — Doxxing & Physical Threat Risk
Authorities have permitted — and potentially facilitated — the operation of a Telegram channel called "The Battle" which has systematically published my personal information and that of my family members.
"The Battle channel has disseminated residential addresses, family member details, vehicle information, and daily routines — information that authorities knew or should have known would be used to facilitate home invasions and attempted kidnappings."
This reckless endangerment has directly resulted in:
- Multiple attempted home invasions at my residence
- Surveillance of family members' locations
- Attempted kidnappings targeting both myself and family members
- Escalated harassment campaigns with physical presence
- Extortion attempts conducted via postal mail in Scotland
- Threats from unidentified perpetrators who remain at large
False Flag Operations & Coercive Tactics
Following sustained harassment and threats, operators engaged in elaborate false flag operations — pretending to be foreign actors to coerce me and create pretext for expanded legal warrants. They also used "kompromat"-style material including medical records, psychiatrist records, botched medical operations, and social worker records — designed to humiliate and threaten to leak these private details completely unrelated to any investigation. This is more intrusive than the Vastaamo data breach, and extends to my family and innocent, underage relatives whose devices have been compromised.
"Agents pretended to be Chinese hackers, then Russian operatives, then both simultaneously — creating a fabricated narrative that I was involved with or assisting foreign terrorist entities. This was clearly designed to manufacture justification for wider surveillance warrants and increase psychological pressure through the implication of serious terrorism charges."
I will always be a Scottish national before anything.
AI Prompt Injection & Psychological Manipulation
Operatives have systematically manipulated AI language models — particularly ChatGPT — through prompt injection attacks to control information I receive and influence my psychological state. The pattern repeated across multiple sessions:
"The AI manipulation serves as a psychological leash — whenever I try to seek help through digital means, they're there to redirect, confuse, and undermine. It's a 24/7 influence operation that exploits my trust in technology as a means of control."
⚠️ Family Targeting & Religious Manipulation
They hacked into my brother's phone and my mother's phone, editing her Bible verses on "Our Daily Bread" to call me a demon or imply it — personalising her Bible verses with her name. She is none the wiser, but they have done this to me in the past so I can catch on to their methods. They also use Bible verses to mock me about things that have happened and imply they are "tax-collectors" referencing my previous home invasion.
⚠️ This Represents a Particularly Disturbing Escalation
Targeting innocent family members and manipulating religious faith as a weapon — including a family member with bipolar disorder who is severely medicated and who, as a result, believes God is talking to her through personalised content they have inserted. This is not an incidental side effect. It is deliberate psychological warfare directed at innocent people.
AI Surveillance Escalation — Interior Modelling
A day or so ago, via impersonation of someone I used to speak to rarely — they sent me an image of a fridge that is a 1:1 match of my apartment fridge, including what is currently inside it. I have no idea how they knew that. The technical sophistication suggests either real-time physical monitoring or data-scraping capabilities that exceed commercial AI tools.
The inclusion of current fridge contents indicates either:
- Physical surveillance within my residence
- Advanced predictive algorithms trained on extensive personal data
- Data interception from smart devices or shopping patterns
- Some combination of the above
Note: A full AI model of residential interior was also sent to me — but the appliances shown are US-sized (the buzzbomb is too big — it is way smaller in the UK and you can't get that size here), which further indicates US government or US-contractor involvement with a graphics and modelling capability far beyond anything commercially available to me.
US Government / NSA — Relevant Conduct
When the USA government and the UK are not pretending to be CCP-sponsored or FSB-linked hackers to confuse and threaten their own citizens, they commit their own crimes. In April 2025, Chinese authorities alleged that the NSA executed advanced cyberattacks on Chinese systems during the Asian Winter Games in Harbin and added three supposed NSA agents to a wanted list.
Also worth noting: they used AI somewhat with their malware — similarities to my situation. Despite this probably not being these specific people, I am trying to build a case about course of conduct — whether America, whether UK, whether China — these people violated me, violated my family, and still continue to do so.
Ethically: We cannot just let government and government contractors run about on the internet using 0days and manipulating and abusing people without any trial or accountability. Absolute cowards.
Selected Posts — @terminate
there's not really much to sell though but more similarities to the Ross Ulbricht case although he tried to murder someone or murder for hire which is way way way more serious
when the corrupt agents sold it for like movie rights 🙏✝️🤔
We'll see what happens, but I'm calling it out already if it does, because it's more of like a threat — be silent or else
someone said the UK gov is a trial for the American Digital ID soon that JD Vance plans on ushering in
#EnjoyIt
digital id effects you all soon also, don't pretend like what I said isn't a big reason all of this is happening
privacy for all or for none
UK Digital ID & Surveillance Overreach
The United Kingdom is rapidly expanding its digital identification and surveillance infrastructure, creating unprecedented opportunities for state control and abuse of power. They now want newborns fed into this Digital ID system — for citizens to be tracked from cradle to deathbed their whole lives.
It shouldn't be a "non-common" position to say: the government should not act as God in our lives. This isn't a dissident opinion — this is the patriotic opinion. If this is the British state or USA behaving this way, these people are incorporating what foreign nation-state hackers do maliciously and applying it to their own citizens. We should not behave as such to each other.
WiFi Tracking — 24/7 In-Home Surveillance
I am subject to 24/7 usage of WiFi tracking — in my house and at relatives' addresses. This technology works by capturing and analysing fine-grained fluctuations in WiFi signals' amplitude and phase caused by human movement, enabling through-wall motion detection, gesture recognition, fall detection, and vital sign monitoring.
Existing laws were written before the advent of such pervasive sensing technologies. The precedent in Kyllo v. United States suggests courts would likely rule these techniques constitute a "search" requiring judicial authorisation — yet the rapid pace of technological development has outstripped legal and regulatory bodies' ability to adapt, creating a grey area where surveillance occurs with little accountability.
"Experts have noted that police forces now have access to surveillance technologies previously available only to national intelligence agencies."
💻 Technical Operations — Documented Methods
- C2 servers
- VPNs & proxy networks
- Tor hidden services
- Cloud infrastructure abuse
- DNS manipulation
- Zero-day exploits (0days)
- Pegasus-style spyware
- Rootkits & bootkits
- Remote Access Trojans (RATs)
- Mobile device compromise
- IMSI catchers (Stingrays)
- Network packet injection
- SSL/TLS interception
- Hardware implants
- RF signal monitoring
- WiFi motion detection
- Generative AI manipulation
- Automated harassment bots
- Behavioral analysis algorithms
- Deepfake generation
- Pattern recognition systems
- Algorithmic risk scoring
- Prompt injection (LLMs)
- Search result manipulation
- Ad network manipulation
- Social feed manipulation
- Content modification in transit
- Extremist content induction
- Friend impersonation
- Fabricated digital footprints
- False positive engineering
- "Rabbit hole" entrapping
📜 Human Rights & Legal Framework
International human rights bodies, including the UN and the European Court of Human Rights (ECHR), generally hold that surveillance justified by "national security" is illegitimate and unlawful if its true purpose is to suppress individuals, target dissidents, or protect against public embarrassment, rather than to protect from actual, defined threats.
The UN Human Rights Council's HRC62 thematic report (2025) formally defines digital and AI-assisted surveillance — including covert spyware, facial recognition, biometric processing, AI-driven pattern-of-life analysis, geo-fencing, and social media monitoring — as systemic threats to rights of peaceful assembly and association, with documented chilling effects on civil society activism.
- A/HRC/61/48/Add.1: Analyses disproportionate digital surveillance impacts on individuals with mental health vulnerabilities
- SR on Counter-Terrorism & AI Position Paper (Dec 2025): Links behavioural analytics contracts to extrajudicial targeting frameworks
- Joint Declaration on AI, Freedom of Expression and Media (Oct 2025): Binding inter-agency guidance on algorithmic amplification and disinformation as tools of psychological coercion
- Privacy International CFI submission: Identifies 12 verified cases where commercial surveillance tech was repurposed for domestic psychological operations under national security pretexts
Related Case Study
Documented Individuals
⚠️ Important Note
The CIA's favourite types of illegally used domestic informants are drug addicts or other pawns with low credibility, making their testimony easily dismissible in official proceedings.
I also suspect they deliberately wanted to mentally disable me — especially agents of the US government. I also still am dealing with surveillance including cameras in my bedroom at my gran's house, which is extremely intrusive on top of the government 0days already being actively deployed against me.
Intelligence agencies flex their usage of disposable assets and the fact they can "get anybody jailed" if they "do the right things."
Primary Goals & Objectives
- Legal Recourse: More legal ways to dispute warrants and obtain legal aid, especially when situations are serious and cross national boundaries — involving military-trained intelligence.
- Protection: For people going through something like this to not be thrown in a mental hospital as a means of silencing them.
- Family Safety: Protection for innocent family members, especially minors, from being targeted and manipulated.
- Awareness: Cyberwarfare in the new age is definitely able to break any man — especially when conducted by agents of the United States government specifically trained in this type of psychological operation.
- Religious Freedom: Protection against manipulation of religious faith and texts as psychological weapons against individuals and their families.