What this site covers: All content draws from publicly available sources — court proceedings, federal indictments, declassified reports, parliamentary records, and investigative journalism. This site is educational. No classified material is reproduced here.
Personal Testimony
First-Hand Account
My Experience — Cyberwarfare & Psychological Operations
Liam Graham's personal documentation of sustained psychological operations, digital interference, algorithmic manipulation, false flag operations, family targeting, and extrajudicial coercion over 1–2 years.
Sting Architecture
Entrapment — Manufactured Crimes, Manufactured Defendants
The Alex Jones / Gavin O'Blennis undercover video, plus the Newburgh Four, Liberty City Seven and Whitmer plot informant patterns. Personal allegation that the same toolkit has been used against me — and speculation about Lil Durk, "Slide for Von," and AI-edited audio in federal court.
Methods & Tactics
Unethical Methods — Documented & Alleged
A detailed breakdown of state and non-state tactics: fake social profiles (FOIA-confirmed), FBI journalist impersonation, MITM webpage modification, sleep deprivation, AI-generated content weapons, digital grooming, and religious manipulation.
UK Surveillance Law
UK Law
UK RIPA & the Investigatory Powers Act
How Britain built one of the most sweeping legal surveillance frameworks in any democracy — bulk interception, equipment interference, spy cops, GCHQ, and documented abuses from councils to MI5.
Oversight Failure
Complaints & Suggestions — Kangaroo Courts
Why the IPT, IOPC, IPCO and ISC together amount to an accountability-free zone — and how the Paul Chowles 50-BTC theft proved that not one of five internal NCA controls ever fires until an outsider forces it.
Insider Breach
GCHQ & MI5 Scandals
Hasaan Arshad — the Manchester student who walked top-secret files out of GCHQ Cheltenham on his work phone — plus the bulk-data IPT ruling, Katharine Gun, Manchester Arena, and the CHIS Act criminal-conduct authorisations.
Location Data
Spyware, Spatial Tracking & Pokémon Go
How consumer apps — including Pokémon Go — harvest precision location data at scale, how law enforcement purchases or subpoenas it, and how it is used to profile, intimidate, and threaten.
UK Police Corruption
Active Trial
Police Scotland: Intelligence Leaked to Gangsters
Two detectives — David Smith and Christopher Dougherty — on trial for leaking top-secret Scottish Intelligence Database records to organised crime, cocaine use on duty, and perverting the course of justice over 12+ years.
NCA / Crypto
NCA: The 50 Bitcoin Theft
Paul Chowles — how 50 Bitcoin was allegedly stolen from a criminal's seized wallet during an NCA investigation, how every internal system failed to detect it, and how independent blockchain analysis caught what the NCA could not.
US Profiling Law
US Government — Cyber Arsenal
Classified Leaks
Military-Grade Cyberweapons
NSA's Tailored Access Operations, EternalBlue, Stuxnet, Vault 7, and PRISM — the documented arsenal of state-sponsored exploits and how they escaped into the wild.
Geopolitics
The US–China Cyberwar
Volt Typhoon, Salt Typhoon, the OPM breach, Microsoft Exchange compromises — a timeline of the ongoing digital conflict between Washington and Beijing.
China — Covert Operations
Influence Ops
Compromising Mayors & Local Officials
The CCP's United Front Work Department targets city councils, mayors, and state legislators. Documented FBI cases, federal indictments, and the mechanics of soft-power coercion.
Intelligence
China Executes US Spies — Publicly
Between 2010–2012, China dismantled a CIA network and executed or imprisoned up to 20 assets. The New York Times investigation, the mole hunt, and Beijing's use of public executions as deterrence.
Disclaimer: This website presents information compiled from public reporting, court records, and government documents. It does not endorse any illegal activity. All referenced events are documented in open sources. The purpose is civic education about the intersection of law enforcement policy, national security, and civil liberties.