;
top of page

The Sovereign Mandate: Weaponizing Intellectual Property in a Post-Truth Era | Project: Bullyish by Lillee Jean Trueman

  • Apr 26
  • 9 min read
The Sovereign Mandate: Weaponizing Intellectual Property in a Post-Truth Era | Project: Bullyish by Lillee Jean Trueman
Forensic Study in Bad Faith. This image illustrates a coordinated attack. The cover of this video used AI technology to misappropriate an actor's narrative. Bad Faith is technically evidenced here in two ways: 1) by utilizing AI to distort and strip logos from a covered work, and 2) by physically removing (cutting out) Lillee Jean's face within a video to create unauthorized content. Within sponsored segments, these actions prove intent to deceive and generate commercialized profit through the theft of registered federal copyrights.


In the modern entertainment landscape, a performer’s image is their most valuable asset. It's who they are. It's how they profit, and how they get jobs. Though I've touched on intellectual property before, as a director and actor who feels quite strong on the subject, I thought it'd be wise recircling to this pertinent study.


Straight up, my face and my films are not "content". I'm a trained professional, and they are my professional equity and federally registered intellectual property. I use the web to promote my works, not to "create" them. That's really the fullest extent of the barrier.


In the current digital landscape, where "hate-for-profit" syndicates weaponize misinformation for AdSense revenue, and sponsorships, I have chosen to move beyond the noise and speak the only language that holds weight in a court of law: Intellectual Property Rights.


I am writing this as a documentarian and a subject of my own forensic study, Project: Bullyish. My goal is to provide a roadmap for fellow entertainers on how to defend their narrative authority against commercialized defamation.


The Commercial Exploitation of the Image


Believe it or not, the above forensic imagery is only a few weeks into late March, early April 2026. That's not including the impersonation account(s).


For years, coordinated groups and entities like Tencent/ACE/Aceville (see my article where I forensically investigate the racket here), have systematically bypassed ROBOTS.TXT protocols to data-scrape my professional site, stealing my intellectual property in direct violation of digital safety standards (Computer Fraud Act).


Specifically, to take into consideration of this study, my registered work, Lillee-Jean-2025-Headshot-3_Trueman (VA002472039), has been subjected to mass commercialized exploitation to brand me as something I am not for pure profit and greed. 


In a disturbing escalation in April 2026, near my birthday, my official acting headshots and personal imagery, such as my appearance in an orange dress from 2021, have been fed into AI generators to create deepfakes for explicit adult sites. Even branding me an "adult star" with archival works circulating to hype up negative noise in the coming weeks.


The nexus? These "videos" serve as a funnel back to nexus hate-for-profit content by legitimate corporations, commercializing my image without consent while using AI to distort my face and strip away my embedded metadata and logos.


This is Bad Faith on a technical and, honestly, on a moral level. By removing these "fingerprints," such as my metadata, logos, and common law trademark stance since 2015, these entities prove their intent to deceive and profit from the mutilation of a professional actor's identity.  Take the cover of this article, my face cut out. Bad Faith.


When a person uses your federally copyrighted work to drive traffic to monetized sites, secure sponsorships, or place your face near MYHERITAGE, for example (see above gallery), without consent, they are infringing on your Right of Publicity by stealing registered assets.


DMCA is a Legal Process, Not "Harassment"

One of the most common tactics used by these syndicates is DARVO (Deny, Attack, and Reverse Victim and Offender). When I, or my team, issue a legal DMCA takedown, or legal cease & desist, to protect my registered assets from being used on adult platforms or defamatory channels, they claim they are being "attacked."


Here is the fact to my fellow entertainer: Protection is not harassment. The DMCA is a formal, legal mechanism. If your work is registered with the federal government, you have a statutory obligation to protect its integrity. Reclaiming my image from a commercialized hate campaign is a matter of professional accountability, not a personal feud. My registered works, such as Purple Top With Crystal Eyes (VA002480749) and Queen Lillee (VA002426898), have been systematically scraped used without consent through AI, and to build a persona of someone for pure hate-for-profit pipelines; thus, enforcing these rights is a final, legal process.


The Litigious Path: Patience and Precision

Above are samples of data scraped works I own federally, and how they've been used to master deepfake campaigns starting January 2026, smear campaigns, and theft of sealed court dockets for profit (weaponized PII).


The legal system is built for true conclusions that are final. Thus, my strategy involves a multi-layered forensic approach, from registered works of motion picture/AV, to photographs. This begins with the formal federal registration of every asset, establishing a verifiable chain of custody that transforms unauthorized use into a matter of federal infringement.


This chain of custody includes my cinematic works, such as Cloud Snow in New Winter (PA0002567460) and So Lillo Qui: Past Moonlight (PA0002559615), as well as editorial photography collections like Editorials of Twenty-Five (VA0002472039) and Timeless But Forward (VA0002319224)


It is vital to understand that a DMCA is a legal service; you must serve an infringer at their legitimate address.  It is vital to fully demystify the legal process and educate fully, based on my experience as performers are being targeted, and one must be loaded with factual information, though I encourage you as a reader to do your own primary source research, too. A DMCA is not a personal grievance. There is a pervasive hoax intended to misinform the public that protecting one’s IP is an attempt to "silence" others. That is not the fact. In reality, a DMCA is a civil remedy provided by federal law to address theft. In my case, I hold several registered federal works.


To pursue this correctly, you serve an infringer via mail, email with your lawyer, or pro se. Under the law, you serve a formal Cease & Desist (C&D), followed by a DMCA notification to the platform/person, and if the infringement persists, you pursue federal court for actual and statutory damages. As a scare tactic, many media corporations and individuals that work for rackets, sensationalize for further profit to prevent retaliation, and claim that serving a legal notice at a legitimate address is "doxxing," which is a fundamental misunderstanding of the judicial system. You cannot hold a party accountable in a court of law without serving them, this is the bedrock of due process. Also to note, you have rights. It's a two way street.


Further, what I've done to complement these filings is I maintain active reports with the NYPD Cyber Crimes Unit and the FBI’s IC3 to document legitimate interstate stalking, doxxing, and the creation of digital explicit forgeries


By maintaining a continuous forensic record, I ensure that the evidence is ready for a judge while maintaining active reports with legitimate subpoenas.


International Sovereignty: The Berne Convention and Moral Rights

Purple Top With Crystal Eyes (Federal Reg: VA 0002480749).
Technical Evidence of Right of Publicity Infringement. This gallery documents the unauthorized commercial exploitation of my registered work, "Purple Top With Crystal Eyes" (Federal Reg: VA 0002480749). As a professional actor and director, these images are federally protected intellectual property and professional equity assets. These samples illustrate a coordinated effort by third-party entities to bypass ROBOTS.TXT protocols, scrape my professional archive, and utilize AI to mutilate my likeness for commercial profit and "hate-for-profit" metrics. Removing metadata, stripping logos, and utilizing deepfake technology to build a false narrative constitutes Bad Faith on a technical level.

As a professional actor and director, these images are not "content", they are federally protected intellectual property and professional equity. These samples illustrate a coordinated effort by third-party entities (many with traced public media agencies and public creation marketing firms) to bypass ROBOTS.TXT protocols, scrape my professional archive, and utilize AI to mutilate my likeness for commercial profit and "hate-for-profit" metrics.


For those thriving on digital scare tactics, victims must understand this: your rights as an entertainer do not end at the U.S. border. Under Article 6bis of the Berne Convention, recognized by over 180 countries, an author possesses the Moral Right to Integrity. This empowers anyone to legally object to any distortion, mutilation, or derogatory action in relation to my work that would be prejudicial to my honor or professional reputation.


When a syndicate uses AI to explicitly destroy an image or distort someone's face for a hate-for-profit nexus, they are not just infringing on a copyright; they are violating international treaties regarding the Right to Integrity.


This is an educational mandate to be honest - an artist's soul is reflected in their work, and the law protects that work from being debased.


The "Fair Use" Fallacy: The Misunderstood Defense

"Fair Use" is often utilized as a shield for those who lack the original ability to edit, write, storyboard, and "FORM" an original thought. Let it be clear: Fair Use is not a license to racketeer.


It is not a defense for bypassing ROBOTS.TXT protocols to scrape data in bad faith. It is not a defense for commercializing a person's likeness on explicit adult sites. It is not a defense for a decade-long campaign of Aggravated Harassment and stalking.


Entities often use DARVO to sensationalize their "victimhood" when their infringement is finally met with a legal challenge. However, that narrative collapses the moment it hits a court docket. The internet is a hall of mirrors - same talk, same profit loop, but the courtroom is a hall of facts.


"Fair Use" is the coward’s refuge, used to justify the theft and mutilation of a performer's work for hate-for-profit metrics. In reality, there is no "Fair Use" defense for commercialized racketeering, doxxing, or the distribution of deepfakes.


It's vital to lean on the full weight of the law, when applicable. Report every single crime to your local precinct, to the FBI IC3 when applicable, and keep a log of how your data is being stolen. In my case, these laws apply: The RICO Act: Addressing the pattern of racketeering activity; 17 U.S.C. § 1202: Civil liability for stripping or altering Copyright Management Information (CMI); Section 50.48 of the NY Civil Rights Law: Protecting against the non-consensual use of a person's voice or likeness in advertising or trade.; The DEFIANCE Act: Addressing the non-consensual distribution of digital forgeries.


My Message to Entertainers: Be Litigious All The Way

Let's face it, what has happened to my family and I has escalated into racketeering, a "pattern of illegal activity" carried out as part of a funded enterprise. When a "client" hires a Black Hat agency to systematically sabotage a Director’s business, they aren't "critics", they are engaging in a racket.


This is, of course, an EXTREME, but with Project: Bullyish, I always prefer to be responsive in helping others, no matter the scale, to know their rights.


Look, a server log doesn't lie. When thousands of hits from server clusters hammer a single human for months to cause sustained downtime, you are looking at a funded criminal enterprise designed to control the narrative for profit.


As of April 2026, I have documented multiple breach attempts on my professional site from the original nexus node members (as shown in my award-winning documentary, which screened in Beverly Hills in 2024), thus, I have taken the necessary steps to pursue every legal avenue available.


These individuals thrive on the anonymity of the web, but as I move toward my upcoming production cycles, I am reminded that the internet is not the court, and all entertainers feeling small, or put into a corner, I want YOU to remember: The judge will review the forensic server logs, you're there for a reason; the jury will see the documented pattern of racketeering, and the actual law will address the deepfakes and the doxxing, as these are documented crimes on the book.


They have tried to silence me by doxxing my home, contacting my relatives, making fake medical appointments in my name, and trading explicit deepfakes. 


My response is not to argue with people who profit from lies. My response is to be absolute. To be forensic, keep logs of each visit, scraped image, and each threat; to be patient, the law takes time; and to be litigious.  Do not apologize for defending what you have built.


My narrative belongs to me. So does my face. Through Project: Bullyish, I am documenting this process so that the next professional targeted by a syndicate has the tools to dismantle them, legally, technically, and permanently.


-


Lillee Jean Trueman


Please visit the official Site:


Forensic Methodology and Estimations: The financial figures, expenditure projections, and infrastructure valuations presented in this report (specifically the "Forensic Bill" and "Total Estimated Expenditure") are forensic estimates formulated by the author. These projections are based on a comparative analysis of industry-standard market rates for enterprise-level cloud egress, global proxy rotation, high-compute data center bandwidth, and AI API consumption during the period of October 2025 – March 2026. Because the private invoices and internal service agreements of the identified third-party infrastructure providers are not public record, these figures represent a good-faith expert projection based on the documented volume and frequency of server logs. No Malice / Investigative Intent: This article is a work of investigative journalism and forensic study published as part of Project: Bullyish. The purpose of this publication is to document patterns of cyber-harassment, educate the public on digital safety, and provide a transparency report regarding the security of the author’s intellectual property. Any mention of specific entities or service providers (e.g., Tencent, Alibaba, Microsoft) is based on direct forensic evidence captured in server logs (IP addresses and User-Agents) and is intended to describe the technical path of the traffic, not to imply that the parent infrastructure providers are intentionally complicit in the harassment. Legal Characterization: Terms such as "Racketeering," "Computer Trespass," and "Digital Shakedown" are used in a descriptive and investigative context to characterize the pattern of conduct observed in the forensic data. These characterizations are the opinion of the author based on the documented "course of conduct" and are not intended to serve as a legal determination of guilt, which is the sole province of a court of law. Reporting and Evidence: All original, unredacted logs, timestamped data, and TCP handshake records referenced in this study have been preserved and submitted to the FBI’s Internet Crime Complaint Center (IC3) and the NYPD Cyber Crimes Unit as part of an active, ongoing criminal investigation.


© 2026 Lillee Jean Trueman. All rights reserved.

 
 
Lillee Jean Logo BULLYISH LOGO.png
  • LilleeJeanLogo

EXCLUSIVE INTELLECTUAL PROPERTY POLICY: COPYRIGHT 2026 LILLEE JEAN TRUEMAN. ALL RIGHTS RESERVED. THE ENTIRETY OF THE PROPRIETARY CONTENT DISPLAYED ON WWW.PROJECTBULLYISH.COM, INCLUDING ALL PHOTOGRAPHY, AUDIO-VISUAL WORKS, DIGITAL ASSETS, MOTION PICTURES, AND ALL TEXTUAL CONTENT (COLLECTIVELY, "THE CONTENT"), IS THE EXCLUSIVE, COPYRIGHTED PROPERTY OF LILLEE JEAN TRUEMAN AND LILLEE JEAN PRODUCTIONS AND IS PROTECTED UNDER UNITED STATES AND INTERNATIONAL COPYRIGHT LAW. NO LICENSE IS GRANTED FOR ANY FORM OF PIRACY, WHICH IS STRICTLY PROHIBITED AND INCLUDES, BUT IS NOT LIMITED TO: UNAUTHORIZED COPYING, DUPLICATING, DOWNLOADING, SCREEN RECORDING, SCREEN CAPTURES, ARCHIVING, EDITING, DISTORTING, FILTERING, CROPPING, OR POSTING OR SHARING ON SOCIAL MEDIA PLATFORMS. FURTHER, IT IS EXPRESSLY PROHIBITED TO ENGAGE IN UNAUTHORIZED COMMERCIAL EXPLOITATION, INCLUDING THE HIRING OF THIRD-PARTY MARKETING AGENCIES OR ADVERTISERS FOR THE PURPOSE OF ANALYZING, HARVESTING, MISUSING THE CONTENT, OR CONDUCTING ANY MALICIOUS OR DECEPTIVE ACTS AGAINST THE SITE'S INTEGRITY. THIS PROHIBITION ALSO INCLUDES ALL FORMS OF DATA SCRAPING, DATA MINING, AND THE USE OF ANALYTICS ON THE SITE OR CONTENT FOR THE PURPOSE OF TRAINING, DEVELOPING, OR GENERATING OUTPUT BY ANY FORM OF ARTIFICIAL INTELLIGENCE (A.I.) OR MACHINE LEARNING MODEL, OR ANY UTILIZATION OF THE DISTINCTIVE VOICE, IMAGE, LIKENESS, OR DIGITAL REPLICA OF LILLEE JEAN TRUEMAN. ANY USAGE REQUIRES THE EXPRESS, PRIOR WRITTEN CONSENT OF LILLEE JEAN TRUEMAN, AND BY UTILIZING THIS SITE, YOU ACKNOWLEDGE AND AGREE TO THESE TERMS, WHICH IF VIOLATED, WILL RESULT IN THE IMMEDIATE PURSUIT OF ALL AVAILABLE CIVIL AND CRIMINAL LEGAL REMEDIES.

bottom of page
Click Here