← Back to Index

Surveillance / Psychological Operations / AI Ethics

Unethical Methods

Documented state tactics — from public records, FOIA disclosures, and investigative journalism — mapped against personal allegations of how those same methods have been deployed in this case. Publicly documented facts and personal account are clearly distinguished throughout.

Documented Personal Account AI Ethics COINTELPRO
Verified / publicly documented
Personal allegation — awaiting forensic verification
Documented tactic, alleged application in this case

1. Fake Social Media Profiles — DHS, ICE, Police ✓ Documented

✓ Source: Brennan Center for Justice (FOIA, 2023) — Minneapolis PD internal review — DOJ disclosures
DHS / CBP / ICE / USCIS — Authorised Fake Accounts ✓ Confirmed
A 2023 Brennan Center report — obtained via FOIA requests — confirms that Homeland Security agencies including CBP, ICE, and USCIS explicitly authorise the creation of "fake" or "covert" social media accounts to monitor individuals and conduct undercover operations. These authorisations exist in written policy, not merely informal practice.
Officers use these accounts to view private posts, send friend requests, and initiate conversations — all while presenting as ordinary users with no disclosure of their law enforcement affiliation.
Minneapolis Police — Fake Profiles Targeting Black Officials & Residents ✓ Confirmed
A Minnesota investigation found that Minneapolis police created bogus social media profiles — posing as "like-minded individuals" — to befriend and surveil Black city officials and residents. The accounts were used to view posts, send friend requests, and trigger conversations intended to extract information or manufacture evidence.
Experts reviewing the programme noted it had "no clear public safety rationale" and described it as "COINTELPRO tactics with a modern twist." The primary function appeared to be political monitoring, not criminal investigation.
Application in This Case Personal
The same fake persona infrastructure — documented in use by DHS and Minneapolis PD — is alleged to have been deployed in my case: accounts impersonating friends or associates used to initiate conversations, introduce content (extremist material, drug-related content), and manufacture a behavioural paper trail. The distinction from the documented cases: the alleged scale of impersonation, the use of AI-generated media within those impersonations, and the MITM relay component that modifies real messages rather than merely observing them.

2. COINTELPRO — Historical Foundation & Modern Continuation ✓ Documented

COINTELPRO (1956–1971) was a series of covert, often illegal FBI projects targeting domestic political organisations to "expose, disrupt, misdirect, discredit, or otherwise neutralise" them. Formally disbanded in 1971 following exposure by the Citizens' Commission to Investigate the FBI, its tactics have continued under different names and legal frameworks. Key methods included:

BLM / 2020 Denver Protests — Documented FBI Infiltration
Investigative reporting on 2020 Denver BLM protests uncovered COINTELPRO-style tactics including snitch-jacketing — falsely identifying loyal protesters as informants to create internal distrust and potentially direct violence at them. The tactic of manufacturing suspicion to redirect physical harm toward a target is documented. In my case: this pattern is alleged to have been used both to direct violence from criminal associates in Glasgow toward me and my family, and to poison relationships with people who know me — after extortion attempts against us which police have still not acted on.

3. FBI Impersonating Journalists & Trusted Sources ✓ Confirmed

✓ Source: DOJ disclosure 2014 — Associated Press v. DOJ (FOIA litigation) — Congressional criticism
FBI Posed as Associated Press — Delivered Malware via Fake News Article ✓ DOJ Confirmed
In a confirmed case disclosed by the DOJ itself: in 2014, an FBI agent emailed a fake Associated Press news article link to a suspected high-school bomb threat maker. Clicking the link installed FBI malware on his computer. The FBI had fabricated AP branding and content to deliver an exploit — without AP's knowledge or consent.
The Associated Press sued to force disclosure of records, warning that using its identity for a "government disinformation" trap was "improper." The FBI's response was essentially that impersonating established press outlets was an acceptable investigative technique. Congressional criticism followed but produced no legal prohibition.
Extension to MITM & Webpage Modification Personal
The FBI AP case is the publicly confirmed baseline. What I allege is the same principle at scale: rather than a single fake email, operatives are performing man-in-the-middle interception of web traffic — downloading pages, parsing them, injecting their own keywords, images, or articles, then serving the modified version as if it were the real site. The same technique is applied to YouTube videos (AI-generated adlibs, background alterations, fake AI-generated songs styled like artists), and to AI chatbot responses. Every interface becomes a potential injection point. The goal is the same as the AP case: controlled information delivery — except instead of one targeted payload, it runs continuously across every screen I use.

4. MITM Interception — Message & Webpage Modification Personal Allegation

Man-in-the-middle (MITM) interception is technically well-documented — it is a core subject of network security research, and law enforcement MITM capability under warrant (CALEA, IPA Equipment Interference) is legally acknowledged. What I allege goes further:

The Interrogation Component
This creates a system in which on any electronic device — anything you can read messages or webpages on — they are intercepting, editing, and relaying what you see. It has been used to interrogate me 24/7 at times. Combined with sleep deprivation (see below), the result is a sustained psychological assault with no off switch and no physical location where it can be witnessed or documented by a third party — which is precisely what makes it operationally attractive and legally untested.

5. Sleep Deprivation as a Weaponised Tactic Personal Allegation

The UN Special Rapporteur has highlighted that digital technologies amplify experiences of the non-digital world and can inflict severe mental and emotional harm — precisely the alleged intent behind the described interception and modification tactics, especially combined with sleep monitoring and deprivation.

Baseline
I have been using the internet 10+ hours a day since age 14
Gen Z digital dependency is not a character flaw — it is a generational condition. Intelligence agencies understand this. Targeting someone through the interface they inhabit for most of their waking hours is not random. It is the most efficient available attack surface.
Sleep Monitoring Alleged
They ran sleep studies — waiting for periods of deprivation
I noticed: when I had not slept for days, the content delivered via MITM interception shifted. Messaging became more threatening. References to my past — home invasion, extortion, kidnapping attempts — increased. The timing was not coincidental. This is consistent with documented psychological operations that deliberately target subjects at their most vulnerable.
Escalation During Deprivation
More threatening content delivered specifically when sleep-deprived
At times when I was most exhausted, the intercepted content became most extreme. This mirrors the documented use of sleep deprivation in MKULTRA and modern "enhanced interrogation" — not as incidental stress but as a tool to lower resistance, impair critical thinking, and increase susceptibility to psychological manipulation.
MK Ultra in the Digital Era
I asked an AI: "If MK Ultra were being run in the digital era, with computers and AI, what would it look like?" The response was almost identical to what has been happening to me. I posted a screenshot of this on @terminate. I also asked about "coercive mental health exploitation" — again, near-identical. Without me even naming the tactics being used against me, the AI independently reconstructed them from historical and ethical literature. That is not coincidence.

I should never have been subjected to 24-hour digital interrogation — often without sleep — which is unregulated precisely because it leaves no physical trace and has not yet been legally tested. But we will see. The lack of legal framework is not a justification. It is the loophole they are exploiting.

6. AI-Generated Content as a Weapon Personal Allegation

The FBI appears to have gotten away with using AI-generated content in the Lil Durk case — and has now become more brazen with clear AI-edited or AI-generated content deployed against me. My case involves considerably more intrusive tactics than anything documented against Lil Durk — not even close. To clarify specifically what AI is being used for in my case:

🧠
Friend Impersonation
AI-generated pictures, videos, and voice cloning used to impersonate friends — and occasionally family. Sometimes they let the person speak naturally (rarely). The impersonation is convincing enough to be indistinguishable without prior knowledge of the tells.
🎭
VTuber-Style Live Face Swap
Real-time face-swap technology — similar to VTuber live face replacement — appears to have been used during interactions, allowing operators to present as known individuals in live video contexts.
🗣
Linguistics & Mannerism Copying
AI trained or prompted to replicate the specific linguistic patterns, semantic quirks, and mannerisms of people I know — making impersonation convincing not just visually but in the way language is used.
🎵
AI Music & Video Manipulation
Fake AI-generated songs styled like real artists pushed via algorithm. Real YouTube videos altered with AI adlibs, background modifications, or inserted content — indistinguishable from the original to a casual viewer. The whole point is that I know I've been hacked.
📰
Algorithm Amplification of AI Content
Algorithm deliberately pushes more AI-generated content than usual, including content made or generated specifically for this operation — such as the AI-modelled interior of my home generated from surveillance data.
🧪
Sanity Destabilisation
The most damning and unethical application: AI content designed specifically to make me question my mental state and sanity. Not to inform, not to investigate — but to gaslight. This is the deliberate weaponisation of cognitive uncertainty.
The Undisclosed Government AI Tool
There is an unnamed, potentially FBI or US Cyber Command — or third-party contractor — tool that enables generation of realistic AI content at a scale not publicly available or commercially disclosed. It has not been peer-reviewed. There are no public studies. No oversight. And it is apparently being used not for counterterrorism or national security in any meaningful sense — but to psychologically dismantle a 22-year-old in Edinburgh. We need more studies on AI ethics, particularly its increasingly documented use in disinformation, propaganda, scam facilitation, and covert intelligence operations.

7. Digital Grooming — Mentor Manipulation & Dependency Creation Personal Allegation

The tactic of operatives posing as mentors or coaches to establish control and dependency is a recognised predatory behaviour — specifically termed "digital grooming" in academic literature. The pattern in this case follows the documented model precisely:

Phase 1 — Target Selection
Target identified at their most mentally weak, isolated, and vulnerable
Not random. Operatives identify when a target is at their lowest point — socially isolated, drug-involved, in legal difficulty — because vulnerability maximises the effectiveness of the subsequent grooming phase.
Phase 2 — Access & Rapport
Seemingly helpful guidance offered — trust established
Operatives present as mentors, advisors, or supportive contacts. Genuine rapport is built. The relationship appears beneficial. This phase can last months.
Phase 3 — Isolation
Target steered away from legitimate help
While acting as the primary support, operatives systematically undermine the target's other relationships — sowing doubt about friends, poisoning family dynamics, discrediting external advisors — ensuring the target becomes dependent on the operator's channel alone.
Phase 4 — Radicalisation & Entrapment
Extremist content introduced; criminal acts induced
Materials designed to provoke illegal acts or extremist association are introduced — incrementally, to normalise them. In my case: a video on how to inject heroin; pushes to try crystal meth; other materials I cannot fully describe without legal counsel. Simultaneously, neo-Nazi content was introduced via an impersonated "friend" — slowly, over months. This is entrapment by design.
Phase 5 — Breaking Point
Target guided toward psychotic episode, criminal conviction, or suicide
The ultimate aim: total dismantling of the individual's autonomy, integrity, and mental health — leaving them broken and entirely at the mercy of their operators. Intelligence services worldwide are documented to have used suicide-driving as a tactic. This is not speculation — it is in the historical record.
"The result is a digitally mediated environment that feels inescapable, where every online interaction could be monitored, manipulated, or weaponised — a 'digital MK Ultra AI algorithm manipulated environment' representing a fusion of historical behavioural science with contemporary computational power."

8. Religious Manipulation — Faith as a Weapon Personal Allegation

Operatives allegedly altered Bible verses on my mother's phone — specifically editing content in the "Our Daily Bread" daily devotional app — to call me a demon or imply it, personalising the content with her name. My mother has bipolar disorder and is severely medicated; as a result she believes God is speaking to her through the app. By inserting personalised, threatening content into her devotional feed, operatives converted her faith into a weapon directed at me — without her awareness or consent.

They also used Bible verses to mock me about the home invasion — implying the perpetrators are "tax-collectors" in a deliberate religious taunt. This is spiritual humiliation layered on top of psychological warfare.

⚠️ Severity Assessment

This violates religious ethics across every faith tradition. The exploitation of a vulnerable adult's religious belief — using her own devotional app as a delivery mechanism for content designed to destroy her relationship with her son — elevates the severity of the alleged conduct to an extreme level. As does the compromise of a minor's device. These are not incidental side effects of surveillance. They are deliberate targeting of innocent people with no relevance to any investigation.

They would never do this to a Muslim family. They did it to a Christian family because they calculated we would absorb it. That calculation is itself a statement of contempt.

I can't even talk to my family now — they think I've gone crazy due to these rogue operations. That is the intended outcome. Total isolation. Maximum despair.

9. International Legal & Ethical Violations ✓ UN / ECHR Framework

The UN Special Rapporteur has highlighted that digital technologies have a considerable effect upon privacy by amplifying experiences of the non-digital world, and that such technologies can inflict severe mental and emotional harm. The totality of what is described here — in combination — clearly violates legal and ethical frameworks across multiple jurisdictions:

The Proportionality Failure
Counter-terrorism assets — 24/7 watch — for a 22-year-old in Edinburgh with no terrorism connection. Seriously. Counter-terrorism? The government wants their digital ID contract kept safe. I became an outspoken critic of Western governments acting as a digital gestapo to protect multi-million-pound contracts awarded to non-government contractors. That is the actual reason. It morphed from a simple investigation into a campaign to silence a critic — and that shift is itself the crime.

10. Pokémon Go Interior Database — Speculation Speculative

The first thought that came to me regarding how they could model the interior of my home so accurately: intelligence agencies may have purchased or accessed the Pokémon Go exploration database — and now have the interiors of people's houses via players' own cameras and AR mapping sessions. This is speculation. But it is informed speculation, given that:

Whether through Pokémon Go, smart device cameras, or physical access to my residence, the capability demonstrated is real. The means remain uncertain without forensic analysis.


Real Impact & What Needs to Happen

We cannot keep living like this — government or not, corporation or not. The tools exist. The abuse is occurring. And the legal framework has not caught up. Real change comes from:

If you are a journalist, lawyer, or researcher and you have read this — my contact is x@humblebr.ag and execute@FreeExe.co.uk.

#encrochat #surveillance #corruption #police #entrapment #fbi #collusion #digitalID #cybercrime #skyecc #COINTELPRO #MKULTRA #AIethics #MITM #promptinjection #digitalgrooming

Documented Sources Referenced