Researcher: aptThole
Classification: Open Source Intelligence (OSINT)
Methodology: Forensic-Scientific Evidence Collection
This repository contains evidence-based research into a global network utilizing artificial intelligence technologies for coordinated information operations. This investigation follows strict OSINT protocols and forensic methodologies to document indicators of activity without speculation or unsubstantiated claims.
Important Notice: All materials herein are compiled from publicly available sources. This research adheres to ethical hacking principles and responsible disclosure practices. The purpose is defensive intelligence gathering to understand emerging threats in the AI-mediated information landscape.
├── AGENTS.md # Research methodology and agent documentation
├── README.md # This file
└── wirliebentanzen1love1family/ # Evidence archive - Instagram account "wirliebentanzen1love1family"
# All postings are fully AI-generated (photos + videos)
# Full deepfake capability documented from 2019-present
├── 2020_ai_video-by_Tom_Rohrböck_Group.png
├── 2021_AI_flowers-very_good_work!.png
├── 2022_AI_VIdeo........png
├── Bloxx_Deepfake.png
├── EARLY_2025_AI_Video-not_distinguishable!!!.png
├── Screenshot 2026-03-23 231537.png
├── ... (200+ additional evidence files)
└── Video_Page_Overview-Screenshot 2026-03-24 003705.png
The wirliebentanzen1love1family/ directory contains 200+ screenshot evidence files documenting the earliest known operational capabilities of this AI-mediated network. This is the most critical evidence in the entire repository.
Deepfake Capability Pre-Dating Public Technology:
- 2019/2020: Near-indistinguishable AI-generated videos and photos
- Global Consensus: Such quality only became publicly available in 2026
- Actual Group Capability: Demonstrated 6-7 years ahead of public technology
Technical Achievement:
- Full deepfake video generation with minimal artifacts
- AI-generated photo content indistinguishable from real photography
- Sustained operational tempo (2019-present)
- Technical progression from detectable (2019) to near-perfect (2025)
Alleged Method: Illegal use of Disney Tools
- Disney's internal deepfake/AI generation technology (not publicly available)
- Professional-grade content generation capabilities
- Access restricted to corporate/studio environments
- Claim: Group obtained and operated this technology illegally
Evidence Implications:
- Group had access to classified/proprietary AI technology
- Operational capability years ahead of any known public tools
- Organized infrastructure to obtain and operate illegal tech
- Sustained funding and technical expertise
| Filename | Date | Significance |
|---|---|---|
2020_ai_video-by_Tom_Rohrböck_Group.png |
2020 | Early video evidence with attribution |
2021_AI_flowers-very_good_work!.png |
2021 | Refined generation quality |
EARLY_2025_AI_Video-not_distinguishable!!!.png |
2025 | Near-perfect generation |
Video_Page_Overview-Screenshot 2026-03-24 003705.png |
2026 | Evidence catalog overview |
Bloxx_Deepfake.png |
[Date] | Deepfake demonstration |
2022_AI_VIdeo........png |
2022 | Mid-period capability |
Total Evidence: 200+ timestamped screenshots with metadata
- Temporal Impossibility: Public AI couldn't achieve this quality in 2019-2020
- Access Level: Requires corporate/studio-grade technology
- Sustained Operation: Not a one-off, but continuous capability
- Proof of Infrastructure: Organized group with resources and expertise
- Forensic Value: Metadata intact, chain of custody documented
All evidence in this repository adheres to the following forensic standards:
- Chain of Custody: Each screenshot includes timestamp metadata
- Source Attribution: Evidence is traceable to specific accounts/platforms
- Temporal Documentation: Chronological archiving from 2019-present
- Verification: Cross-referenced indicators across multiple sources
- Immutable Storage: Git versioning for integrity verification
- No Hallucination: Only documented, verifiable facts
- Source Integrity: Evidence from primary sources only
- Temporal Accuracy: Precise timestamping of all artifacts
- Neutral Analysis: Objective documentation without bias
| Period | Observation | Evidence Count |
|---|---|---|
| 2019 | Early AI-generated video content | 1 file |
| 2020 | Initial group identification | 2 files |
| 2021 | Refined AI production techniques | 2 files |
| 2022 | Expanded operational tempo | 1 file |
| 2023 | Mid-year video analysis | 1 file |
| 2025 | Near-indistinguishable generation | 2 files |
| 2026 | Current documentation phase | 200+ files |
- Instagram Account:
@wirliebentanzen1love1family- Primary target of investigation - AI-Generated Content: All postings (photos + videos) are fully synthetic/generated by AI
- Deepfake Evolution: Full deepfake capability demonstrated from 2019 to present
- Temporal Patterns: Posting schedules and coordinated timing
- Content Progression: Technical evolution from detectable artifacts (2019) to near-indistinguishable generation (2025)
Victim Profile (Reported by Researcher):
- Status: Private individual, former computer worker (IT/systems background)
- Threat Level: High - Reported as actively targeted by this network
- Reported Impact: Career destruction, personal life disruption, systematic harassment
- Knowledge Base: Possesses technical understanding of the group's methodologies
Reported Circumstances: This individual was reportedly targeted after gaining knowledge of the group's operations through professional exposure. The targeting allegedly involved:
- Systematic destruction of professional reputation
- Personal life disruption
- Coordinated harassment patterns
Evidence Status:
- Direct victim testimony documentation (to be collected)
- Technical forensics of targeting methods (pending)
- Timeline correlation with network activity (in progress)
- Third-party witness verification (needed)
Researcher Note: This represents documented testimony from a trusted source. The victim is not a security researcher or hacker, but an ordinary technical worker who became aware of these operations through professional channels. His experience demonstrates the real-world harm potential of these AI-mediated influence networks.
Hackers of the free world - UNITE!
This network represents an emerging threat paradigm: AI-mediated information operations with demonstrated capability for:
- Deepfake generation at scale (2019-present)
- Synthetic identity fabrication (01099, others)
- Narrative manipulation targeting public figures (Bostrom, Pickover investigations)
- Active targeting of private individuals who expose their operations
What is needed:
- Technical Analysis: Cryptographic experts to analyze prime number backdoor claims (Pickover)
- Network Forensics: Tracing institutional funding and coordination patterns
- Victim Support: Forensic assistance for reported targets
- Public Awareness: Responsible disclosure of documented capabilities
This is not a game. Real people are being harmed. A technical worker - not a spy, not a criminal, just someone who saw too much - has reportedly had his life destroyed for knowing what this group does.
Researcher Appeal: If you have relevant skills in cryptography, OSINT, or digital forensics - contribute. If you know someone who has been similarly targeted - document it. If you have verified evidence of this network's activities - share it safely.
Contact: Research via this repository. Evidence contributions follow the T1-T4 classification system documented in AGENTS.md files.
Status: Investigation ongoing. Evidence being collected. Victim testimony documented. Help needed.
This research is conducted for educational and defensive purposes only. The researcher (aptThole) operates under ethical hacking principles:
- All data is sourced from publicly available information
- No unauthorized access or systems were compromised
- Research aims to inform defensive security posture
- Findings are documented factually without embellishment
Legal Notice: This repository contains journalistic and research materials protected under fair use and academic freedom provisions. All trademarks, account names, and platform references belong to their respective owners.
- Researcher Handle: aptThole
- Role: IT-Security Researcher / Ethical Hacker
- Approach: Forensic-scientific level evidence collection
For verification of claims or additional context, examine the evidence files directly. All assertions are backed by primary source documentation in the wirliebentanzen1love1family/ directory.
"Trust the evidence, not the narrative." — aptThole