0% found this document useful (0 votes)
12K views68 pages

v2k Study IV Summary

The document discusses the phenomenon of V2K (voice-to-skull), where individuals report hearing voices transmitted remotely, often linked to electronic targeting and neurological warfare. It categorizes the types of voices and targeting methods, highlighting the psychological and physical effects on victims, referred to as targeted individuals (TIs). The study aims to analyze the content and tactics of these voices without identifying the attackers or their methods, while also addressing the increasing prevalence of such claims globally.

Uploaded by

christian.voice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12K views68 pages

v2k Study IV Summary

The document discusses the phenomenon of V2K (voice-to-skull), where individuals report hearing voices transmitted remotely, often linked to electronic targeting and neurological warfare. It categorizes the types of voices and targeting methods, highlighting the psychological and physical effects on victims, referred to as targeted individuals (TIs). The study aims to analyze the content and tactics of these voices without identifying the attackers or their methods, while also addressing the increasing prevalence of such claims globally.

Uploaded by

christian.voice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

AUDITORY TARGETS:

A STUDY OF SYNTHETIC TELEPATHY, OR V2K,


AN ASPECT OF REMOTE ELECTRONIC TARGETING
(Max Harrison Williams et al., April, 2021)

Executive Summary

Many people claim that they hear voices that are not theirs and that they
are the only ones who can hear them. Those voices are sometimes called
synthetic telepathy, subliminal voices, and other names, but they are
generally referred to as V2K, or voice-to-skull. The voices are transmitted
to those persons from afar, or by remote, which means that the person or
group sending the unwanted voices are unseen and the devices/methods
that they use are unseen and largely unknown.

This is the fourth of a series of studies made of the voices. The purpose of
this study is to examine the content of those voices to learn more about the
tactics that the attackers use in their verbal assault. The study does not
attempt to identify the attackers or the weapons that they use. Instead, it
only analyzes what the attackers say and how they say it.

This study attempts to broaden the knowledge of the reader concerning the
phenomenon of the voices and at the same time dispel some of the beliefs
that many doubters hold about those voices.

Two Types of Voices

Targets can actually receive two types of remote-generated voices: (1)


“audible” voices, or those readily heard in the targets’ heads or brains
(V2K); and (2) “Inaudible,” or “silent” voices, those projected at a very high
signal and thus cannot be picked up by a target’s conscious. Instead, they
are heard by a target’s subconscious.
The latter is far more dangerous in that the victim is not aware of those
voices that often tell him what to think, say, and do or what not to think,
say, and do. Questions answered by participants in the study cover both
types of voices.

1
Targeting

The voices are only one aspect of remote-delivered physical and


neurological assault; thus, to understand the voices, one must also
understand the concept of remote-generated targeting. If some person,
organization, or group dislikes someone, if they wish to do harm to that
person or seek to profit somehow from that person, and if they have the
means to do so, that person becomes red-lined, or targeted.

The attack process is called targeting, the end result of which is expected
to be the neutralization of the victims. Neutralization can mean modifying
their thought process and their behavior, totally isolating the targets,
sending them to mental institutions or prisons, or causing their eventual
deaths. We refer to the people behind the targeting as the attackers, or
perpetrators, and the victims of the attacks as targets, targeted individuals,
or simply TIs.

The result of electronic targeting can only be seen as torture. Many targets
believe that the targeting is a spin-off of neurological warfare experiments
conducted by the military and the intelligence agencies of the US and other
countries. While the genesis of electronic targeting may have come from
one single source, over the years, the method and the devices used to
carry out the targeting have doubtlessly fallen into various other hands.

An increasing number of people all over the world, and particularly in


developed countries, report that they are being attacked by unidentified
remote sources using unknown devices or methods to produce many
harmful physical and neurological effects. Previous studies show that the
number of targets has increased significantly since the early 2000s. Thus,
targeting appears to be proliferating. This study concerns only targets in the
United States, Canada, and the UK.
Critics of people who claim to be targeted often suggest that the targets are
instead victims of mass hysteria; however, they fail to describe an event
that could lead targets to mass hysteria that would not also affect the entire
American population.
Moreover, several thousand targets living in diverse locations who
complain of many of the same remote-delivered results are not likely to be
victims of mass hysteria. In fact, our experience shows that targets have

2
already been suffering from those effects before they begin researching
and communicating with other targets on the web.
Targeting takes several forms: (1) One form employs yet highly classified
devices that can focus and fix upon a person to pound him by remote with
many physical effects. (2) Another form of targeting consists of using
similar devices to focus and fix upon a person to achieve a myriad of
neurological, or psychological effects, also by remote. (3) Probably most
targets receive both the physical and the neurological effects.

(4) Still another form concentrates on harassing the target on-site in various
manners: using organized stalkers against him; vandalizing his property;
making surreptitious entries into his domicile; tampering with his postal
mail, his computer, and his telephone; strewing rumors about him in his
neighborhood and work place, and employing other forms of harassment.
That form is often referred to as gang stalking, organized stalking, or overt
harassment (OH).

This study concerns only the first three forms. Those forms operate by
remote methods, which means that the attackers are not seen and the
attackers’ device or devices do not touch the body. The first two forms
function in tandem with each other. The remote distance can be only
meters away from the target or hundreds, perhaps thousands of miles
away. The farthest range has not yet been determined by targets.

The fourth form of targeting is performed on the ground in and near the
target and the target’s surroundings. The voices are used only in the
second and third forms of targeting. This study touches upon the first three
forms of targeting but focuses on the voices found in the neurological
torture.

Reasons for Electronic Targeting

The victims’ statements about their targeting and its effects suggest that
there are several reasons that persons are targeted:

1. Experimentation

Studies suggest that the physical and neurological capabilities of the attack
weapons, whatever they may be, are already well proven. However, those

3
capabilities remain to be tested on the many characteristics of human
targets. Imagine the diversity of the population. How do people who
represent that diversity react to the many facets of V2K assault?

For example, how does a particular feature of the V2K attacks affect a
person of Asian descent versus a person of Caucasian descent? How does
a person who did not finish high school respond to a particular feature of
V2K attacks opposed to a person with a PhD? All of those variations are
extremely important in the application of V2K for neurological warfare,
behavior and thought modification, population control, and other purposes.

The attackers appear to be still engaged in proving those capabilities based


on race, ethnicity, gender, medical conditions, religious beliefs,
geographical location, schools of thought, physical characteristics,
educational level, I.Q., perhaps DNA, sexual orientation, mental states,
family make-up, occupation/profession, and other human characteristics.

Research on the brain is still ongoing. There are thousands of nerves and
nerve clusters whose functions have not yet been identified. In research
conducted on the brain and the nervous system for purposes of
neurological warfare, every finding must be tested on the multiplicity of the
population to determine how it affects every element of that population.

2. Punishment, Vengeance, and Reprisals

Governments, large corporates, religious institutions, political PACs, and


other persons and groups have perceived enemies. If any of those entities
had the means, they probably would not hesitate to target certain
individuals whom they view as enemies.

3. Quest for Financial and other gains

This is only rarely the reason for targeting; yet, there are targets who
present credible evidence that various individuals or institutions have
targeted them or relatives to rob them of money or other assets.

4. Sowing Discord

Mounting circumstantial evidence tends to show that today certain


countries are engaged in targeting to sway the opinions of the leadership in

4
other countries and to sow suspicion of the governments and discord
among their citizens. Countries with that capability include the US, the UK,
Israel, Russia, China, and perhaps India and others.

5. Amusement

Many targets believe that they are objects of virtual “reality shows” seen by
viewers over the Dark Web. Although there is no proof of this, some of the
tactics of the attackers could be interpreted as being designed for remote
viewing by voyeurs.
The Capabilities of the Attackers
Physical Targeting Effects
Although this study concerns the voices, in addition, the attackers’ devices
can cause an extraordinary variety of physical effects, some of them only
annoying and others, life threatening. As already mentioned, many of the
effects are also natural-occurring symptoms experienced by many people;
thus, the claims made by targets cannot be proven.
Here are some of the physical effects that the remote attackers are able to
cause. This list is not exhaustive. Other targets can doubtlessly suggest
additions to this list.
-- sensation of pin pricks in the eyes, shoulders, face, feet, elbows, and
other areas.
-- intense pressure on the bridge of the nose. The constant pressure is
intended to lay the groundwork for inducing anxiety.
-- restless legs. A sensation begins in the small of the back and extends
into the extremities, causing the “restless legs” syndrome. Sometimes
when that happens, the legs will jerk involuntarily.
-- hunger pains in the stomach, even when the target should not be
hungry.
-- electrical-like jolts. These affect the entire body and feel much like the
shock that one gets from touching a low voltage electrical fence.
-- tremors, or vibrations. These can affect the whole body or be focused on
specific parts of the body. They can range from very mild to violent.

5
-- zapping in/on the head. These sound much like sparks from a welder’s
torch or like children’s sparklers used as fireworks on holidays.
-- a “heaviness” in the chest that makes one feel always tired.
-- clicking in the ears.
-- severe cramping, mainly in the calves of the legs.
-- numbness in the limbs from the base of the spinal column to the toes.
-- unnatural coughing and sneezing.
-- extreme gastric problems, leading to irritation of the stomach lining and
infections in the esophagus and the duodenum.
-- stomach aches and pains, indigestion, nausea, and dizziness.
-- gas on the stomach and in the intestines.
-- lethargy and listlessness. I suspect that many people suffering from
Chronic Fatigue Syndrome (CFS) are actually victims of remote torture.
CFS was not identified until the 1980s.
-- tinnitus. Almost every target who receives the voices also suffers from
tinnitus.
-- inability to urinate or frequent urination.
-- chronic constipation.
-- sleep deprivation.
-- simulated “faux” heart attacks.
-- the sensation of crawling insects on the face and neck.
-- intense itching. This can be any place on the body. The attackers often
will make it seem much like a mosquito bite or a fire ant bite. The itching
is normally on the hands or the feet.
-- twitching of the fingers. The attackers not only want to annoy you but
also convince you that you are developing Parkinson’s disease.

-- partial loss of sight.

6
-- destabilization of hand-to-eye coordination, causing targets to strike their
hands against objects, misstep, bump against objects, stumble, and
misjudge their distances.
-- inability to open one eye or the other in the morning.
-- twitching eye lids.
-- throbbing in the head.
-- aches and pains in various parts of the body. The attackers can also
cause arthritic-type pain in the hands, pains in the lower back, and
extreme pain in the legs by striking the sciatic nerve.
-- unnatural salivation.
-- conversely, dry mouth.
-- tingling vibration focused on areas of the face, often causing basal cell
cancer.
-- involuntary physical movements. Targets have suffered serious falls,
when the devices caused their knees to buckle. The attackers’ device
can also cause the arms and legs to flail and jerk involuntarily.
-- heart flutters and irregular palpitations.
-- extreme sensitivity to light.
-- pressure on the bladder, causing the victim to want to urinate very often.
Conversely, the attacker can prevent a target from urinating.
-- unexplained sores in various areas.
-- high and sudden temperature rises in the body.
– “stopped-up” hearing canals.
-- pressure (causing numbness) on bridge of nose, the kidneys, and the
prostate.
-- intense itching on the scalp. This is sometimes preceded or followed by
pin pricks on the scalp.
-- constriction in the esophagus and hiatal hernia.

7
-- “faux” heart beat that occurs on the back opposite the heart or on the
head.
-- electrical-like buzz in the groin and on hips.
-- artificial heating of the body.
-- acute pain on hands and feet. In the latter, attackers like to concentrate
on the callused part of the sole, usually the part near the smallest toe.
-- numbness and rigidness of feet, including the toes. The attackers can
cause what appears to be neuropathy by reducing the circulation in the
toes and the feet. Neuropathy causes the victim to be unsteady on his
feet and reduces his ability to get around.
-- unnatural plucking of the lips, usually the upper lip.
-- nasal drip.
-- tingling in calves of legs.

-- unnatural pulsing of the calves of the legs.

Neurological Targeting Effects

The attackers can also achieve far more neurological, or psychological,


effects of targeting than simply the voices. The attackers have very
obviously studied the brain and have developed any number of mind tricks
to harass and torture the target. Deception runs deep in the application of
the psychological effects. Here are some of the methods and effects of the
attackers’ devices due to “hooking” the brain. Some of them may appear
impossible to most people; however, targets state that they are very real.

-- Hear and record one’s conversations along with those with whom one
talks.
-- Record a person’s voice and then later simulate that same voice.
-- See through the victim’s eyes what the victim sees.
-- View the interior of the target’s body and zoom in on any part or organ of
the body, even in the darkness. EKG, CT scans, and functional MRIs can
be performed on targets by remote.

8
-- Induce dreams, stage scenarios, and engage in subliminal (telepathic)
interrogations.
-- Inject holographic pictures or images into a victim’s thoughts.
-- Implant false memories in victims.
-- Cause the target financial problems, ruin his credit, and drive him into
bankruptcy. Keep in mind that most targets live on fixed incomes and
most of them have to live frugally. Yet, the attackers employ a bag of
tricks designed to drain the target financially through the following
actions.
 Making the target spend thousands of dollars on remedies and gadgets
that he thinks may shield him from the effects of targeting and causing him
to hire detectives to investigate the targeting and initiate useless lawsuits.
 Causing the target to make mathematical errors on his taxes and
other documents that result in substantial losses.
 Affecting the target’s judgment that ends in his making faulty and
costly decisions.
 Destroying expensive household and other items, making targets
have to replace them.
 Distracting the target so that he forgets to pay bills on time, leading to
his paying costly penalties.
 Creating problems with the electrical system and mechanical devices,
especially computers and printers, which targets have to hire
technicians to repair.
 Urging the targets through their voice-to-brain subliminal suggestions
to buy expensive needless items.
 Fomenting personal and other problems that require that targets hire
lawyers. A TI correspondent wrote about her taking videos of
neighbors overtly harassing her and then being arrested for that
action. She had to hire a lawyer to get out of jail. Of course, nothing
happened to the harassers. Moreover, now that law abiding citizen
has an arrest record that will follow her to the grave.
 Sending targets to hospital emergency rooms due to physical
problems they cause with their devices. One TI correspondent rushed
to the ER on at least three occasions when the attackers caused her
throat to constrict, keeping her from breathing. Most medical
insurance policies do not pay the total costs.

9
 Ruining the targets’ credit. The manipulators and their accomplices
will steal credit card and other statements from the targets’ mail
boxes or “lose” them in the postal system, causing targets to pay late
fees; by whispering into the targets’ brains, make them forget to pay
bills; and interfere with the targets online payments to cause them bill
payment problems.
 Robbing targets of their time by harassing them continually with
electronic assault and mind control, thus keeping them from tending
to their business affairs. Very often targets lose their jobs because of
the targeting distractions in their lives.

Causing targets financial ruin is crucial to the aims of the attackers. Broke
people are usually harmless and defenseless. Many of the targets with
whom I have corresponded have depleted their savings and have gone into
bankruptcy because of the attackers. Others have been forced into
homeless shelters and still others have become virtually street people. The
attackers set out to ruin targets financially, and they often succeed.
-- Discredit the target by causing him to react in strange ways to the
targeting, which in turn makes him appear insane or demented. Because of
the target’s odd actions, he is often forced by the authorities to undergo
psychological evaluations. Most of the time, those evaluations result in the
target’s being labeled schizophrenic. Once he is diagnosed as
schizophrenic, he loses all credibility.

-- Monitor and manipulate the target’s emotions and cause mood swings in
targets. The attackers will often fill the victim with emotions that cause
moods that range from explosive anger to total complacency. Those mood
swings are seen by many observers as a mental disorder.
-- Read a victim’s thoughts. There is irrefutable proof that university,
medical, independent researchers, and defense contractor scientists have
developed various devices and methods that, when operated with
computer programs, are capable of reading human thought. Many of those
methods have been patented. Other methods were probably grabbed by
the U.S. Government before they were patented. In reality their device
actually intercepts a target’s thoughts several seconds BEFORE the target
becomes aware of the thoughts.

10
The mind reading capability not only gives stalkers access to everything in
the victim’s mind but also provides them massive amounts of information
about friends and family members of victims. The stalkers feverishly exploit
this information 24/7. Knowing targets’ thoughts also gives the stalkers
computer passwords (and thus control over my communications),
information about business matters, and previous knowledge of actions and
movements.
-- Transmit voices into the brain/head that only the victim can hear. Targets
usually refer to this as voice-to-skull (V2K) and sometimes as subliminal
speech, synthetic communication, telepathic communication, or microwave
hearing. The US Government began experimenting with the voices back in
the 1940s.
The capability of producing voices by remote was first described by
scientist Allan H. Frey in an article called ‘Human Auditory System
Response to Modulated Electromagnetic Energy” in 1961 in the Journal of
Applied Physiology. By the mid-1970s, beaming voices and other sounds
into people’s heads or brains by remote was an unchallenged reality. This
is not conjecture but a proven and undeniable fact.
Plausible Deniability
Unfortunately for targets, most of the conditions or effects caused by their
attackers also occur naturally in humans. The difference is that with targets,
their conditions/effects are induced by their attackers. However, the
attackers know that targets cannot prove that their conditions/effects are
not natural but are induced.

Thus, it is difficult for targets to convince others that what is happening to


them is actually not a naturally occurring ailment or condition. Targets refer
to this concept as “plausible deniability,” which makes it almost impossible
to prove beyond a doubt that what happens to targets is intentional. No
proof, no crime.

Voice Transmissions

Of the many remote-delivered effects of the attackers, one of the most


sinister ones is transmitting voices into the heads of targets that only the
targets can hear. We refer to those persons who receive the voices as
“auditory targets.” Those targets become involuntary hearers of those

11
voices, and there is no known way to prevent the voices from being heard.
Victims have come to call those voices a variety of names, such as voice-
to-skull (V2K), microwave hearing, microwave auditory effect, electronic
telepathy, synthetic telepathy, audio subliminal messages, and the Voice of
God.
In addition to transmitting voices, the attackers can also mimic and project
many other sounds into the domiciles of the victims and into their
surroundings, for example, sounds of doors slamming, birds cooing (when
there are no birds), dogs barking (when there are no dogs), unexplained
thuds against the wall, telephones ringing, doorbells chiming, loud popping
noises, people shouting, and many other sounds. The sounds and voices
normally occur whenever the targets are alone.
Psychiatrists, Enemies of Targets
Persons who state that they hear voices are routinely considered by law
enforcement and others as psychotic. In fact, authorities often require that
the auditory targets submit to “psychiatric evaluations,” claiming that the
victims are likely to hurt themselves or others. Psychiatrists, citing the
DSM, invariably label the auditory targets schizophrenic or paranoid-
schizophrenic. Some auditory targets are even committed to mental
institutions based on those evaluations.
Indeed, psychiatrists have a vested interest in condemning those who hear
voices as paranoid-schizophrenics, for psychiatrists can treat only natural
symptoms, not induced or remotely transmitted ones. Thus, to protect the
credibility of their profession, psychiatrists must necessarily disclaim the
possibility of actual transmitted voices, or synthetic telepathy.
An article in the January 1, 2018 issue of The Washington Post by
Nathaniel Morris called “This Secret Experiment Tricked Psychiatrists into
Diagnosing Sane People as Having Schizophrenia” drove home the point
that psychiatrists cannot accurately diagnose schizophrenia. Morris related
an experiment conducted by Dr. David Rosenhan of Stanford University
several decades ago, which sent eight perfectly sane people to different
hospitals claiming that they heard voices.
One of the participants was a psychiatrist and three, psychologists. All eight
“patients” were admitted to the respective hospitals’ psychiatric wards
where they said that they no longer heard the voices. Despite that, they
remained from seven to fifty-two days. While there, they were given a total

12
of 2,000 pills, among them antipsychotics and antidepressants, most of
which they secretly discarded. Even the nurses who attended the patients
often noted actions on the part of the patients that suggested that they
were mentally ill.
When the experiment was revealed, Morris writes that the experiment
became a “disaster” and an “albatross” for the psychiatric community. Dr.
Rosenhan stated that the experiment proved that “. . . we cannot
distinguish the sane from the insane . . . .”
The Targets
Victims of remote voice transmissions cover the entire spectra of the
population. They include both genders and all ages. They also include all
races, ethnicities, levels of education, professions/occupations, religions,
philosophies, states of health, political leanings, economic statuses, social
strata, and life styles. Many of the victims are veterans.
Auditory targets range from the very young to the very old, the minimally-
educated to the MDs and PhDs, from the atheistic or agnostic to the piously
religious, from the public assistance recipient to the well off, from the
apolitical to the political activists, and from single people of various life
styles to the family-focused patriarchs and matriarchs. The only known
commonality that links the victims is that they all receive the voices.
The victims state that they hear the voices and other V2K-related sounds
wherever they go whether they are in airplanes at high elevations, in hotels
and other places outside their domiciles, in heavily wooded areas, in
underground facilities, and wherever else they go, even abroad. Thus, we
know that the remote voice-transmitting devices must have the capability of
going through walls and other structures and being beamed over vast
distances.
V2K doubters point to the presence of the voices heard everywhere as
proof that the auditory targets are truly mentally ill. However, the remote-
driven V2K was publicly demonstrated in 1973, forty-five years ago, and it
is virtually certain that in the meantime far more sophisticated but classified
methods have been developed to propagate the voices.
In previous studies of the voices, the earliest remote auditory targets state
that they began hearing the voices in the very early 1980s. Some targets
hear the voices only sporadically while others receive incessant voices both
day and night. Auditory targets are found in every industrialized nation and

13
in many developing countries. This study focuses only on Americans,
Canadians, and one participant from the UK.
Until recently, targets in general, including the auditory targets, have been
treated with doubt and disdain by the media, law enforcement, and the
public, who consider their claims incredulous. However, in the late summer
of 2017, attacks on US diplomatic personnel in Havana, first called “sonic”
in the media reports, focused international attention on some of the
symptoms that targets receive, for example, tinnitus, loss of hearing, visual
and balance problems, and vibrations, all oft-mentioned effects of targeting.
Later, diplomats in Uzbekistan and China also complained of similar
effects.
More recent reporting on the symptoms of the diplomats hints that some of
the victims may have also heard voices. A New York Times article entitled
“Update—NYT: Microwave Weapons Are Prime Suspect in Ills of U. S.
Embassy Workers,” dated September 1, 2018, states that the method used
on the diplomats could transmit “loud booms” and “words.” If indeed the
diplomats heard voices, US Government entities and the American media
have seemingly downplayed that information for some reason.
The Remote Voices

Although we do not yet know for certain, the various patents concerning
remote voice projection suggest that the attackers do not use one single
device on their targets but probably several different devices all controlled
by a single computer. One or more devices will probably administer the
physical effects on targets, and another device or devices will deliver the
neurological, or psychological effects.
We still do not know how contact is first made with the targets and how that
contact can be fixed upon the targets permanently. Nor do we know for
certain the methods of delivery of both the physical and the neurological
effects.
The voices are a key element in neurological, or psychological attacks on
targets that lend toward mind control. Without the voices, the attackers can
only harass the targets physically. If the aim of the attackers is only to
make the lives of the targets uncomfortable and painful, the physical
attacks achieve that purpose.

14
However, if the attackers seek to take over the lives of their targets, they
must also take over the minds of those targets, thus the neurological
element of the attack plan. Without the voices both to the targets’
ears/heads (audible) and to the targets’ subconscious (inaudible), mind
control would be impossible.
Proof of Remote-Delivered Voices
The United States, among other industrialized nations, has shown a keen
interest in neurological warfare, including the projection of sounds and
voices, since the 1940s. In the 1940s, persons standing near radar
antennas reported hearing voices. Their experiences were met with
skepticism, and others questioned whether those hearers might have
mental problems.

Perhaps because of the skepticism, it was not until 1961 that Allan H. Frey
described the possibility of producing voices by remote in an article called
“Human Auditory System Response to Modulated Electromagnetic Energy”
published in the Journal of Applied Physiology.

In 1973, researcher Joseph C. Sharp successfully demonstrated the actual


transmission of remote voices into the skull. Dr. Don R. Justesen, Director
of Laboratories of Experimental Neuropsychology at Veterans
Administration Hospital in Kansas City, described that method in an article
called “Microwaves and Behavior” in the March 1975 issue of the American
Psychologist. It seems that Justesen had gotten his information directly
from Sharp, who was by then conducting a secret study called Pandora for
the US Navy, a study that also involved the voices.

Justesen explained that by “radiating themselves with ‘voice modulated’


microwaves, experimenters could distinguish clearly nine words sent to
them by remote. He wrote that article in 1975. By 1997, the method of
sending voices to peoples’ head by remote had been perfected, as
evidenced in an announcement on the Environmental Protection Agency
web site in that year. Describing the Department of Defense’s voice
research, the announcement stated that the “innovative and revolutionary
technology . . . offers a low-probability-of-intercept radiofrequency (RF)
communications, [the feasibility of which] has been established using both
a low intensity laboratory system and a high power RF transmitter.”

15
J. A. Elder and C. K. Chou of Motorola Florida Research Laboratories in a
2003 report entitled “Auditory Response to Pulsed Radiofrequency Energy”
described the hearing process: “RF [radio frequency] induced sounds
involve the perception via bone conduction of thermally generated sound
transients, that is, audible sounds are produced by rapid thermal expansion
resulting from a calculated temperature rise of only 5 x 10 -6 degrees C
[centigrade] in tissue at the threshold level due to absorption of the energy
in the RF pulse.”

Elder and Chou further reported that the temporal lobe of the brain
detected the RF sounds and by placing a sheet of metal over that area, the
sounds could not be heard. Nevertheless, many auditory targets have tried
shielding against the V2K with metal, and they have been unsuccessful.
Thus, in the meantime, scientists have probably invented a method to
circumvent metal shielding objects. In a 1967 article in the New York State
Journal of Medicine called “Sensation of Hearing in Electromagnetic Fields,
C. E. Ingalls stated that the effective radiofrequency was in the 10,000
megahertz range.

By the early 2000s, the capability of sending voices by remote to people’s


heads without their knowledge or consent was a hard and fast fact. An
article in The Washington Post in January 2007 revealed that “In 2002, the
Air Force Research Laboratory patented precisely such a technology using
microwaves to send words into someone’s head.” Artificial Intelligence (AI)
now allows attackers to send non-stop messages to the hearer by remote.

Representatives of the Air Force laboratory involved refused to discuss


both the reported patent as well as any research related to it, adding, “We
can only stress again that the world media avoid publishing the full scale of
the progress in the research of the remote control of human nervous
system.” Seemingly the media has since cooperated with that request, as
the media today usually states or suggests that when people are reported
to hear voices, they are mentally ill.

In the last decade and a half, scientists have doubtlessly made great
improvements to the devices/methods used to communicate remotely with
subjects. Although the reality of remote voices to people’s heads can no
longer be seriously debated, we still do not know for certain the devices or
methods currently used to transmit the voices from the sender to the
receiver. Just as in the last fifteen or so years the development of methods

16
for using DNA has been greatly improved, we believe that likewise the
development of voice transmission devices and methods has made giant
leaps.

Voice Transmissions
One method of transmitting the voices by remote is called “silent sound,”
described in Dr. Oliver Lowery’s Patent Number 5,159,703. Silent sound, or
the present-day subliminal sound, is often conducted over public address
systems, and is inaudible to the ears but subconsciously perceptible. That
method has been adequately demonstrated over the years.
The patent states that by using supercomputers, attackers can “analyze
human emotional EEG patterns and replicate them, then store these
"emotion signature clusters" on another computer and, at either real-time
or at will, ‘silently induce and change the emotional state in a human
being’.” In other words, silent sound can be used for mind control.

A similar method is known as Audio Spotlight, which is projected in the


range of above 15,000 Hz, which humans cannot hear, to achieve the
same effect. Auditory targets will either hear nothing or will experience a
type of continual tinnitus. Audio Spotlight can be conducted directly to the
victim using air type transducers, directly to the victim’s brain using
“modulated microwave pulse train,” or by imposing messages on top of
commercial radio or television transmissions. We still do not know the
range of the Audio Spotlight; however, it has been heard at 200 meters
when used in quiet environments.

Many similar patents attest to the interest in communicating between


humans by remote methods, including the following: US6470214 (1992),
O’Loughlin/Loree, “Method and Device for Implementing the Radio
Frequency Hearing Effect (microware hearing); US6052336 (1998),
Lowery, “Apparatus and Method of Broadcasting Audible Sound Using
Ultrasonic Sound as a Carrier (ultrasound); and US6587729 (2002),
O’Loughlin/Loree, “Apparatus for Audibly Communicating Speech Using
the Radio Frequency Hearing Effect (microwave hearing). Those methods
have been demonstrated and proven effective.

Many targets believe that the attackers use hypnosis to entrain the auditory
target’s subconscious to comprehend—but not hear--the content of those
inaudible voices. Indeed, hypnosis is often used. In 1974, researcher J. F.

17
Schapitz corroborated that belief when he stated, "In this investigation [,] it
will be shown that the spoken word of hypnotist may also be conveyed by
modulated electromagnetic energy directly into the subconscious parts of
the human brain - i. e. without employing any technical devices for
receiving or transcoding the messages and without the person exposed to
such influence having a chance to control the information input
consciously." In other words, the victim is entirely helpless to reject those
thoughts conveyed to his subconscious.

Because the method of delivery is performed remotely, attackers are able


to assault the victims with the voices 24/7 with complete impunity. As the
devices/methods are still largely unknown and unseen, victims are left with
no known universal defense against the voices. Unlike a TV or a radio, the
remote voices cannot be turned off. Victims of the voices must often endure
them day and night, day in and day out.
THIS STUDY
Participants’ Backgrounds
Thirteen auditory targets participated in this study, nine Americans, three
Canadians, and one from the UK. Although there is territorial diversity
among the participants, racially twelve of the participants are Caucasian,
with only one Asian. Normally, in the study there are African-Americans
and other races and ethnicities.

Why the particular victims are selected for targeting and for V2K assault is,
naturally, always in the minds of victims. What criteria do the attackers use
in choosing the victims? Let us examine the tabulations of the background
questions for possible answers.
None of the participants is very politically active, which means that the
motive for their targeting would probably not have been for political
purposes. Likewise, none of them had served in the armed forces, although
four had worked with the government on some level, so the Department of
Defense would probably have had little motive to target them unless the
targeting is for experimental reasons.

Twelve of the participants had had some degree of dependency on drugs


or alcohol, and twelve of them had also visited a psychiatrist. There is
nothing to suggest that among a collective population of over a half billion

18
people authorities would have a particular interest in targeting only those
with former drug problems. Nevertheless, medical and social research
institutions may want to use the victims as research subjects for various
types of experimentation.

In regard to the drugs and alcohol, some targets are convinced that law
enforcement is behind their targeting. While it may be true that the police
might harass an individual, the police in most cases would not have the
sophisticated devices/methods to use in remote targeting. In addition, the
cost would be prohibitive on most law enforcement budgets.

Even if law enforcement should target someone, they would have no need
to employ psychological trickery and the voices on the victims. Moreover,
the cost of maintaining constant surveillance and bombarding the victims
with physical and neurological effects would be enormous. Thus, we can
probably eliminate law enforcement as an entity as being the remote
attackers. However, could some law enforcement officers be involved in the
targeting? Surely, they could.

Interestingly, ten participants had had some kind of surgery, most of them
before they discovered that they were targeted. There are known cases of
microchip implantation without the knowledge and consent of the targeted
victims performed by surgeons and others. It would be an easy matter to
insert microchips during surgical procedures so that the patient could be
used as a research subject by medical institutions and research labs.

Financially, all of one of the participants earn under $20,000 a year. Ten
are either on medical disability or unemployed. Two are retired. Only one is
gainfully employed, and that person is the only one who earns more than
$20,000 a year. Therefore, there seems to be little financial motive for their
targeting.

Spiritually, ten participants practice some type religion or hold some type of
religious-type philosophies. Three are agnostic. Cases of targeting because
of religious beliefs, however, seem to be very rare.

Only one participant has a college degree. That, of course, has nothing to
do with the intelligence quotient of the participants. The education level
would probably not figure in the selection of most of the participants as
targets unless it were of an experimental nature.

19
Thus, it appears that the most plausible reasons for targeting the
participants in this study are for (1) experimentation and for (2) punishment
for something that the participant said or wrote. None of the participants
appears to be an activist or a whistleblower, which tends to point to
experimentation as the greatest possibility for their targeting.

Participant Tabulation

01. Twelve Caucasians and one Southeast Asian.


02. Nine females and four males.
03. Six have never married; two are married, and five are either
separated or divorced.
04. Five have at least one parent born abroad.
05. Seven are 30-50; three are 50-70; two are over 70; one is under 30.
06. Two in MA; three from Canada; Florida; UK; two in PA, Nevada; one
in the US (state not given); New Zealand; Illinois.
07. Only one was adopted.
08. Four are the only child in the family.
09. Only two are left-handed; one is ambidextrous.
10. Twelve had had some dependency on drugs or alcohol at one time.
11. One had a college degree, seven had finished high school and had
done some college work or received other training, two finished high
school, two did not finish high school, and one answer wasn’t clear.
12. Seven are Christian; three are agnostic, two lean toward Asian
religions/philosophies; and one states that he/she is “religious.”
13. All thirteen are not politically active.
14. Ten make under $20,000/year; two did not answer that question; one
makes $20,000-60,000.

20
15. Four are unemployed; machinist; land scaping; customer service; the
arts; registered nurse; SsDi (?); mechanic; machinist; and office
administration.
16. Six on medical disability; four unemployed, two retired; one
employed.
17. Nobody had served in the Armed Forces.
18. Four had worked for the government on some level.
19. Ten had reported their targeting to authorities; three had not.
20. Ten had undergone some type of surgery, most of them before they
discovered their targeting; Three had not had surgery.
21. Four did not know their blood type, 4 type A, 1 type AB, 3 type O, one
did not answer.
22. Nobody speaks a different language fluently, one speaks “medium
French.”
23. Seven do not live alone; five live alone; one lives alone with a small
child.
24. Only one states that perhaps his/her children can hear the voices;
one has a sibling diagnosed as schizophrenic.
25. Six live in houses, six live in condos, apartments, or townhouses, one
lives in duplex.
26. Six had travelled abroad; five had not travelled abroad; two did not
answer the question.
About the Study
This study was conducted largely to determine what tactics the attackers
use in their V2K attacks, and particularly, presuming that there are many
groups of attackers, the similarities in those tactics. Thirteen participants
compared what their attackers say and how they say it as well as the
physical and neurological effects that those attackers use along with the
V2K.
There are a number of ways to present our findings. We have used the
following method: we list below the similarities in the physical and

21
psychological attacks, beginning with those on which all thirteen
participants agree, then twelve, eleven, and finally ten. Those similarities
shared by nine and below are treated in a following section.
Under each number of participants, the similarities are listed under two
headings: Physical and Psychological. The reader will notice that some
similarities can be interpreted to include both physical and psychological
characteristics. Similarities noted by nine participants and fewer are not
listed under Physical and Psychological. Here are the tactics used by the
V2K attackers.
A discussion of those similarities follows each number of participants who
experience them. Those similarities are seen in the questions and
tabulations of the questions found in the study’s Appendix.
SIMILARITIES IN PARTICIPANTS’ V2K TACTICS
Thirteen Participants
Physical Similarities
Causing ceaseless tinnitus, or “ringing in the ears.”
Promoting digestive problems.
Causing victims’ hearts to race abnormally.

Psychological Similarities

Depriving victims of sleep.

Sending victims on wild goose chases.

Trying to convince victims that they are delusional.

Trying to destroy victims’ relationships.

Programming victims to think and act in a certain manner.

Inducing anxiety.

Making victims feel guilty and apologize to somebody.

22
Causing victims to feel that they are unattractive.

Expressing anger at victims for certain thoughts and actions.

Discussion

A cursory examination of the similarities of the thirteen participants reveals


that the crux of the V2K attacks is psychological in nature. Indeed, physical
electronic effects alone would have little success in neutralizing the victims.
However, the physical effects along with the V2K and its psychological
symptoms provide a formidable weapon for the attackers.
A quick look at the similarities also shows that the attackers have at their
command many options for the use of the devices/methods. A computer
would be required to carry out those options. Indeed, it is probably not
coincidental that targeting developed in the same time frame with the
computer.
The three physical similarities of all thirteen participants are significant.
Rarely, if ever, do victims experience V2k without the ringing in the ears.
We do not yet know whether the tinnitus is intentional or only a side effect
of the devices/methods used in sending the V2K. It could even be a natural
reaction of the victim’s ears/brains that pick up the signals. Yet, V2K and
tinnitus go hand in hand.
Likewise, the digestive problems that all thirteen complain of are adjuncts
of V2K’s psychological effects. Experience shows that digestive problems,
or upset stomach, lend toward anxiety, which is one of the chief objectives
of the attackers. Extreme anxiety renders victims almost helpless.
The racing heartbeats of all thirteen participants are clearly intentional.
Along with the unnaturally fast heartbeats, the attackers often cause a
sharp pain in the heart or the chest, making the victim believe that he is
having a heart attack. Targets refer to that as “faux heart attacks.” They are
very common among targets.
All thirteen participants have been led by the V2K attackers to believe that
they are losing their minds. Indeed, what person who suddenly begins to
hear other voices in his head would not think that he is perhaps “hearing
things?”

23
You will notice that one psychological similarity shared by all thirteen
participants is anxiety. Actually, all of the remainder of the psychological
similarities listed, particularly sleep deprivation, aid in inducing anxiety.
Twelve Participants

Physical Similarities

Bothering victims with both physical and neurological effects before


important events.

Introducing unfamiliar smells and odors that are not characteristic of their
victims’ ambience.

Causing pin pricks on the body.

Viewing the victims and what they do by remote.

Hacking victims’ phones.

Causing a tickling in hairs of victims’ noses, ears, and eyebrows.

Creating the sensation of a current running through targets’ bodies.

Causing computer “glitches.”

Causing cramps in various parts of the body.

Sending electrical-like jolts to victims’ bodies.

Psychological Similarities

Sending often frightening holographic images of people, scenes, and


objects.

Making threats to vandalize victims’ property and harm their family


members and friends.

Sowing lewd and negative stories about friends and loved ones.

24
Blanking out thoughts in victims’ minds.

Talking about incidents in victims’ childhoods.

Leading victims to believe that food and drink have been tampered with.

Causing targets to believe that people talk about them.

Using the V2K to cause targets to become sexually aroused.

Reading the minds/thoughts of victims.

Repeating the thoughts of victims back to the victims.

Taking credit for anything negative that happens in victims’ lives.

Discussion

All of the physical similarities as well as the psychological similarities given


above contribute to inducing anxiety. (Please see the following section
about anxiety.)

Phone tampering and computer hacking are constants in targeting. That


interferes with targets’ ability to communicate with others. Without those
devices, targets are socially isolated, which contributes to anxiety.

In addition, participants’ similarities clearly show that the attackers possess


the capability of either hearing or seeing on some type of monitor the
thoughts of the victims. That those thoughts are repeated to the victims
prove beyond doubt to participants that capability.

The twelve participants represent 92% of the entire group. If this group is
representative of the targeted voice hearers, it appears that the greatest
number of both physical and psychological similarities occur in that
percentage of the targeted group. In other words, all of the highest 8% of
targets get certain tactics in common, and the lowest 8-10% get some
unusual tactics; however, the upper level of the middle range gets the most
physical and psychological tactics used by the attackers.

ELEVEN PARTICIPANTS

25
Physical Similarities

Manipulating victims’ sexual organs.

Causing victims to sneeze and cough by scratching or tickling throat and


nose.

Psychological Similarities

Whispering in the V2K so that voice hearers have to listen more closely to
what is being said.

Threatening to kill victims’ family members.

Suggesting sexual intimacy between the attackers and the victims.

Interrogating victims by stating people’s names and questioning victims


about those people.

Using Artificial Intelligence along with real and recorded voices.

Threatening to send victims to jail or prison.

Talking about particular persons whom the victims know and programming
victim’s thoughts about those persons.

Pretending to be law enforcement.

Leading victims to believe that the attackers can see out of the victims’ own
eyes.

Discussion

You will notice that most of the participants experience some type of
manipulation of their genitals. Sex plays an important role in targeting. The
capability of the attackers to manipulate participants’ sexual organs causes
shame and guilt in the minds of participants. Helpless against that invasion
of privacy, targets become frustrated by the lack of control over their sexual
being. Once again, that leads to anxiety.

26
Most people respect authority figures. It is little wonder then that the
attackers often pretend to be law enforcement and investigators. That
intimidates the targets and psychologically probably aids in the attackers’
capability of extracting information from targets. Threatening targets with
jail is a psychological ploy to frighten targets, most or all of whom have
never committed any significant crime.

Whether or not the attackers can see what targets are doing by actually
seeing through the targets’ eyes remains to be proven. Targets know that
their attackers do indeed know what they are doing at any given time; yet, it
may be that the attackers have a panoramic view of targets’ activities rather
than seeing those activities through targets’ eyes. Also, as the brain
controls all activities, the brain may be conveying those activities to the
attackers via the attackers’ method of reading minds.

One can see that the psychological similarities far outweigh the physical
ones. The largest part of the V2K assault is based on psychology. Assault
on the mind is far more effective than assault on the body. The physical
effects only serve to heighten the effects of the psychological assault.

TEN PARTICIPANTS

Physical Similarities

Monitoring victims’ bodily functions.

Causing physical effects that make victims appear unattractive.

Psychological Similarities

Discouraging victims to engage in social activities with others.

Suggesting to victims that the attackers are xenophobic.

Talking negatively about a particular group or particular groups.

Using power of suggestion to affect adversely victims’ appearances.

Referring to victims as gay or suggesting that they are gay.

27
Threatening to send targets to the emergency room or the hospital.

Informing victims that certain friends and family members are also targeted.

Telling victims’ that they’re very smart.

Giving victims commands for actions that victims do anyway.

Trying to convince victims that friends and family members are plotting
against them.

Causing victims to forget where they place objects.

Substituting words heard on TV or radio with different words in victim’s


minds, usually ugly words or those of a sexual nature.

Threatening to leave victims penniless.

Inducing dreams in which the attackers stage scenarios and skits


sometimes involving the victims.

Talking about places where victims have lived.

Directing victims’ thoughts to certain people, places, or objects and then


questioning the victims about them.

Interrogating victims about their thoughts and actions.

Discussion

Physically monitoring victims’ bodily functions and making victims appear


unattractive are pro forma in targeting. Unattractiveness causes victims to
isolate themselves socially. Social isolation makes targets more vulnerable
to the psychological assault and exacerbates anxiety.

That the attackers are able to monitor targets’ bodily functions should come
as no surprise. Their devices register changes in such functions as blood
pressure. For example, when a door suddenly slams and startles the
victim, the change in blood pressure shows on their devices.

28
A feature that is almost always a part of V2K assault is the attackers’
interrogations. The attackers already know much about the targets
whenever they begin their assault. The interrogations augment their
information not only about the targets but also about people whom the
targets know.

It is evident from the tabulations that targets in this group, or 77% of the
entire group, receive the greatest number of psychological effects from the
attackers.

[The following similarities are those that from nine to four participants
have experienced. They are not categorized under Physical and
Psychological.]

NINE PARTICIPANTS

Hear the voices continually day and night, as opposed to four who hear the
voices only at certain times.

Their attackers praise them for something they think, say, or do.

Their attackers pretend to want to extort money from them.

Hear voices in public talking about them but do not actually see the talkers.
Have problems with constipation.

Their attackers tell them that they are crazy about someone or that
somebody wants them.

Have heard voices in their V2K that they thought that they were not
supposed to hear.

The attackers lead them to think that they are having a heart attack or
stroke.

Commanded by the V2K attackers to do ordinary tasks that they would do


anyway.

29
Believe that their attackers have a panoramic view of them and see
everything that they do.

State that their attackers appear to be homophobic.

Their eyes have become extremely sensitive to sunlight or other bright


lights.

Their attackers pretend to want to extort money from them.

EIGHT PARTICIPANTS

Originally heard more than one voice.

Their attackers ask them questions about their relationship with a particular
person or group.

Their attackers have told them that they (the attackers) were responsible
for them or were assigned to them.

Told by their attackers that they are hardheaded or stubborn.

Have an unnatural craving for food although they are not actually hungry.

Their attackers have suggested that if they change their thoughts,


statements, and actions that their targeting would end.

Feel touches on the face that make the spots seem numb or that tickle in
that particular spot.

Hear the voices coming from other objects, usually objects that have some
type of motor.

Their attackers state a number and have the victims think of anything
related to that number.

Told to apologize for something that they have done but not told what that
was.

Have heard voices that sounded like someone they knew.

30
Led by the attackers to believe that a friend, neighbor, or relative was
responsible for a missing item.

Have been disoriented by their attackers while driving and have made
wrong turns, etc.

SEVEN PARTICIPANTS

Their attackers pretend to have known their family years ago.

Hear a clicking in one ear or the other.

Hear the voices over running water.

Their attackers tell them that they knew them (the victims) in the past.

Encouraged by their attackers to eat and drink in excess and to eat the
wrong kinds of food.

Led by their attackers to believe that someone else was in the room with
them in the darkness.

Feel an intense itching on the scalp that forces them to claw their scalp.

Have heard hints from the attackers about the locations of the attackers.

Their hearing ability has become worse.

Their V2K attacks have intensified since they first began.

Have been told that a friend or loved one has been unfaithful and was
having an outside affair.

Have noticed a degree of compassion on the part of the attackers.

SIX PARTICIPANTS

Hear the same voices now that they first heard.

31
Heard only male voices at the beginning of their V2K.

Did not experience any physical effects BEFORE their V2K began.

Their V2K attackers tell them that they are going to hell.

See the faces of people whom the V2K attackers mention.

Their attackers use a particular code name for them.

Have seen drones in their vicinity.

FIVE PARTICIPANTS

Their attackers have “apologized” to them for the attacks.

Told that their attackers were going to burn down their domiciles.

Believe that their attackers may be well educated.

FOUR PARTICIPANTS

One of the voices that they hear sounds much like their own voices.

They were not bothered by stalking before the electronic attacks began.
Have been told that a friend or a family member was having a nervous
breakdown.

Their attackers tell them that they are not patriotic.

Their targeting began after an intimate relationship ended.

Discovered their targeting while with or after having intimate partners.

The attackers had tried to convince them that they had a duel personality.

THREE, TWO, AND ONE PARTICIPANTS


Three heard other languages used in their V2K attack.

32
Three have been led to believe that they could frighten or harm their
attackers by using their minds.
Only two have had psoriasis.
Only two have heard obvious recordings of harangues by professional
speakers and “preachers.”
Two have been told by their V2K attackers that someone in the family was
sexually abusing somebody.
Only one had been told that he/she was sexually attracted to someone no
longer living.
Discussion
The physical and psychological effects that the remainder of the
participants receive demonstrate the versatility of the V2K plan of attack.
The attackers have at their command an impressive bag of tricks that allow
them many options for individualizing, or tailoring the attacks, for particular
targets.
SUMMARY AND CONCLUSIONS
Answers to the more than two hundred questions in this study provide us
some insight into targeting and especially the voices. They show that
although the participants are far flung geographically, the modus operandi
of their V2K attackers does indeed share many similarities.
What this tells us is that originally a type of user manual was probably first
used in teaching attackers to use the torture plan. It also suggests that at
first there was only one group that had access to the plan. However, over
the years the devices/methods have either been purposely lent to other
groups or have been purloined by other groups. As various other persons
and/or groups acquired the devices/methods used for electronic attacks,
they kept some of the more general tactics and also improvised and
customized other specific tactics to suit their own individual purposes and
agendas.

Today, there seemingly are many groups, each one with its own particular
purpose but each one basically using the same overall V2K attack plan to
achieve that purpose. The stark contrast between some participants’ V2K
assault from other participants’ assault tends to confirm the existence of

33
multiple groups of attackers and the diversity of effects of the attack
system.
In this study, the participant who started hearing the voices the earliest
gives the date as 1995. The remaining twelve participants began hearing
the voices in the 2000s. Seven of the latter started getting the voices from
2007 onward. Thus, our information suggests that the number of auditory
targets is steadily increasing.
No voice-hearing participant receives only the voices. All of them also
receive various other physical and other neurological effects. In fact, I do
not recall ever corresponding with a voice hearer who did not also get other
physical and neurological symptoms. The two go together.
Deception reigns in the implementation of the plan of V2K attack. The
attackers attempt to mislead targets in believing who is behind the
attackers. They very often try to convince the victims that their attackers
are law enforcement or investigators. And they lead victims to think that
they are all-powerful and that the victims are helpless.
It is very clear that the plan of attack via V2K is based mainly on
psychological effects rather than physical ones. The physical effects only
reinforce the psychological assault. Total control of the victims appears to
be the ultimate objective. That control can only be achieved by tampering
with the brain for the brain determines the victims’ thoughts and actions.

To control the victims, it appears that the attackers must render them
helpless. Ewen Cameron, a Canadian psychiatrist who worked with the
American CIA in the 1950s, developed what he called “psychic driving.”
That program attempted to break down a victim through physical
discomfort, sleep deprivation, forced listening to recorded materials, the
misuse of sound, and other means.

The V2K assault contains many elements of “psychic driving.” In asserting


control over the victims, the V2K attackers seemingly rely on inducing
anxiety in victims as an end result of their tactics. Once extreme anxiety
has been accomplished, the victims are basically helpless.

In their V2K assault, the attackers attempt to adversely affect the lives of
the victims in any possible manner. Threats against the loved ones, friends,
and property of the victims, the use of sex or sexual themes in their attacks,

34
affecting the capability of victims to earn a living, playing upon guilt and
remorse, and other forms of attack make the lives of victims almost
unbearable.

Except the case of experimentation, neuralization of the victims appears to


be the expected end result of V2K assault. The enemy must be taken out.
Attacks upon the minds of those enemies, although costly, leaves no
smoking gun, does not reveal the assailant or the weaponry, and is
exceedingly effective.

Anxiety, a Major Weapon of the Attackers


Much of V2K is intended to Induce anxiety in victims, one of the attackers’
main objectives, for extreme anxiety wrecks the victims’ ability to think
rationally and also ruins his physical health. Anxiety can be induced by the
attackers’ manipulating parts of the brain and whispering and playing loop
play tapes to the victim’s subconscious. Most of the neurological effects
stand alone in their dangerousness. However, those effects collectively are
intended to induce anxiety.
Anxiety is difficult to understand for those who have never experienced it. It
is a condition that causes a high state of nervousness, a feeling of un-
wellbeing, and a sense of unsettledness in a person. It places one on edge,
full of fright but not knowing what is frightening him. It robs the victim of
sleep, for he is even afraid to sleep. The thought of waking in the morning
to the same apprehensive state makes him fearful of going to bed.
It keeps him from eating because he thinks that the food will choke him to
death or it does the opposite, causes him to stuff himself with food when he
does not want or need it. He is apprehensive, depressed, defensive,
disoriented, disgruntled, and unfocused. He is unable to concentrate. He
cannot make plans, and even if he can, he cannot execute them. He looks
haggard.
All thirteen participants in this study have digestive problems. One of those
problems is often constipation. By tampering with the muscles at the anal
cavity, the attackers can block efforts to defecate. The victim’s stomach
contents turn to bile and he becomes bloated and very uncomfortable. The
discomfort greatly aids the attackers in inducing anxiety.
The attackers play on a victim’s vulnerabilities in creating anxiety. They
know a victim’s most vulnerable emotional moments, which are usually the

35
result of some traumatic negative action like a divorce, a house foreclosure,
the loss of a job, or the death of a loved one. They play up that loss with
the hidden voices, causing the victim extreme anxiety. The effects make
the victim appear paranoid schizophrenic.
As a result of the anxiety, the target often goes over the edge into full
panic, which drives a victim to a psychiatrist, sometimes gets him
committed to a psychiatric clinic, or causes him to take some other drastic
action such as rampage shootings or suicide. In the least, a visit to a
psychiatrist destroys a target’s credibility.
Additional Research Required
In conducting scientific research, one must ask and answer the cardinal
questions of who, what, when, where, why, how, and how much. This study
focuses principally on the “what” and the “how.”
We now know many, perhaps most of the tactics used by the attackers in
the application of the V2K. However, to be effective in using the V2K, the
attackers must also employ physical and neurological effects. The V2K
alone would not accomplish the attackers’ objectives.
Additional, more technical research is required to determine “who” is
responsible for targeting and the V2K and “how” the targeting and V2K is
carried out. The least important of those questions in the case of V2K
appear to be the “why,” the “where,” and the “when.”
What Every Voice-Hearer Should Know
Answers to the more than two hundred questions in the study serve as both
a warning and a guide to targets who receive the V2K assault. What have
voice hearers learned over the years about V2K?
Underneath the plainly heard V2K, the attackers use a far more dangerous
form of V2K that is not readily heard, sometimes called the “silent” V2K,
that instead goes to the victim’s sub-conscious. Every victim who receives
the audible voices also receives the inaudible ones. The damage that the
silent V2K causes is incalculable.
The attackers’ V2K assault is based on the simplest use of psychology.
Whereas psychiatrists and psychologists supposedly use their knowledge
for positive purposes, the V2K attackers use psychology for totally negative
ones. Along with the audible V2K, the attackers relentlessly ply the victim

36
with the unheard, silent voices to tear down his self-esteem and self-
confidence, fill him with guilt and remorse, to turn him against his family
members and friends, to damage his appearance and health, to fill him with
suspicion of neighbors and every element of the government and society,
to make him feel useless, and to cause him to think, say, and do things that
get him psychologically evaluated and sometimes sent to the psyche ward,
to commit acts that get him jailed or imprisoned, or to goad him into
committing suicide.
The voices and especially the silent voices represent the cruelest form of
touchless torture. They ruin lives. They destroy families. They wreak havoc
in society. They fill prison and psyche cells. They make victims’ lives
unbearable. The voices are the judge, jury, and executioner of victims who
are deemed guilty without due process.
Voice hearers are often deluded by their attackers, who use deception in a
most masterful form. Victims must understand that their attackers are
actually the epitome of cowardliness who hide behind distance. They
seemingly derive pleasure from the torture and the result of that torture.
The attackers are inhuman creatures whose mere existence blights the
earth. They are the basest of all evil. V2k receivers must learn not to heed
anything that the attackers tell him.
Until a victim understands the vileness of his attackers and that almost
every word of the attackers is based on deception, he will fall prey to the
attackers’ psychological assault. Indeed, many targets do. Regardless of
why victims are selected for targeting and V2K reception, the attackers are
callous and cruel criminals whose torture should be condemnable in every
corner of the earth.
APPENDIX
Tabulations of Questions Asked in the Study

Set 1 Tabulations

001. When did you first start hearing the V2K? (Year)

1995, 2000, (2) 2006, 2007, (2) 2008, 2013, 2015, 20017; (2) 2016, 2018,
(One says that the V2K stopped for about 6 years and then started back.)

002. In what location did you first hear the voices? (Country and city)

37
BC, Canada; Toronto, Canada; Calgary, Canada; (3) Florida; Illinois, Idaho,
(2) Massachusetts; California; New Jersey; Texas.

003. Where were you when you first heard the V2K? (House, car, airplane,
etc.)

Seven were in a house; one was in an RV on his/her property; one was on


a boat; four were in a condo/apartment

004. How would you describe those first voices? (Threatening, insulting,
frightening, etc)

Various answers, but all indicated that the voices were intrusive. One
stated that the voices were not at first threatening but later became
negative.

005. How many voices did you at first hear?

Eight heard more than two voices; five heard only one voice.

006. Were they male voices or female voices or a mix of voices?

Six initially heard male voices; seven heard a mix of voices. Nobody heard
only a female voice.

007. Did the voices have a particular accent? (If so, please explain.)

Only one heard voices that did not all sound American. One said that a
woman was British. One said that the voices were Southern at first. One
said that they spoke with a lisp. One said that at first they sounded
Southern and then changed to English as spoken by a Korean.

008. Do the attackers now use the same voices every day?

Six said that they still hear the same voices; five said no; one was unsure;
one answer was not clear.

009. Are the voices you hear today the same ones that you first heard?

38
Six said that the voices they hear are those that they first heard; six said
no; one said he/she was unsure.

010. Do you receive the voices (a) only occasionally, (b) intermittently
during the day and night, (c) only in the daytime, (d) only in the nighttime,
or (e) continually?

Nine hear the voices continually. Four hear them at various times.

011. Have the attackers’ voices ever sounded like they came from your
stomach?

Only one hears the voices at times in the stomach.

012. Have you awoken at night while the V2K attackers were asking you
questions?

Ten are asked questions or at one time been asked questions.

013. If so, what is the nature of the interrogation? (people, places, events,
etc.)

Various answers.

014. Do your attackers sometimes threaten to destroy your possessions or


vandalize your property or do they take credit for having done so?

Only one said that the attackers do not threaten to vandalize or take
possessions.

015. Do you also receive holographic images along with your V2K?

Twelve said that they receive holographic images or have at one time
received them.

016. If so, what type of images do you see? (people, places, objects, etc.)

Various answers.

39
017. Do the attackers tell you ugly and negative things about your friends
and relatives?

Twelve said that they talk about friends and relatives or have talked about
them at some time.

018. If so, what kind of things do they tell you about them?

Various answers.

019. Do you wake at night to dreams that you know are induced?

Ten said that they get induced dreams; two said that it’s possible that they
do; one answer is unclear.

020. Do the attackers sometimes praise you for something that you do or
think?

Nine said that their attackers sometimes praise them for something.

Set 2 Tabulations

021. Do the attackers pretend that they knew your family years ago?

Seven participants said no; six said yes.

022. Do the attackers sometimes pretend to be local law enforcement or


investigators?

Eleven said yes at one point or another; only two said no.

023. Do the voices sound louder/clearer in one ear than the other? (If so,
which ear?)

Only five said the they were no louder/clearer in one ear than the
other; three said they were louder on the right side; three said that
they were louder on the left side; two answers were no clear.

024. Do the V2K talkers sometimes cause a clicking sound in one or both
ears?

40
Seven heard clicking in one ear or the other at some point; only five
got no clicking at all; one was unsure;

025. If you receive more than one voice, are they all the same volume and
seem to come from the same place? [For example, do you sometimes hear
a woman’s high-pitched voice screaming in the background, seemingly
from a distance?]

[I should have been more specific in my question. The answers are


difficult to determine.]

026. Does one of the voices sound similar to your own voice?

Only four stated that one of the voices sounded like their own voices.

027. Do the attackers stage scenarios or create skits and make you the
principal actor during your sleep?

Ten said that they do; two were unsure; one answer was not clear.

028. Do your attackers often whisper and talk in a very low volume that
allows you to hear only snatches of what they say?

Eleven said that they do; only one said no; one person did not answer
the question.

029. Do your attackers ever direct your thoughts to certain people, places,
or objects and then question you about them?

Only three said no.

030. Do your attackers appear to want to cause you sleep deprivation?

All thirteen said that they are sleep deprived to some extent.

031. Have the attackers ever spoken to you in other languages? If so, what
language?

41
Three said that their attackers had used another language; one said
that they caused him/her to speak in Russian.

032. If so, does that language have any particular significance in your life?

One of the three said that the language was that of his/her parents;
one said that it was a language that he/she took in high school and
college.

033. Do the attackers ever ask you about your ‘relationship” with a
particular individual or group?

Eight stated that they do.

034. Have you experienced a ringing in the ears (tinnitus) ever since you
first heard the voices?

All thirteen experience tinnitus.

035. Do the voices ever seem to come from the shower head or the
spewing water when you shower?

Seven hear the voices over the sound of rushing water.

036. Do your attackers especially bother you the night before an important
event? (a job interview, departure for a trip, etc.)

Only one stated no.

037. Do you sometimes wake at night with the attackers showing you
photos of people, places, or objects and interrogating you about them?

Ten said no.

038. Do they pretend to extort money from you or blackmail you?

Only four said no; one said that they did extort/steal money from a
relative.

039. Do they ever talk about places where you’ve lived or visited?

42
Only three said that their attackers did not mention other places.

040. Have they ever told or suggested to you why you were selected for
targeting?

Only one stated definitely no; others have gotten hints about the
reason.

Set 3 Tabulations

041. Do the attackers pretend that they knew your family years ago?

Seven participants said no; six said yes.

042. Do the attackers sometimes pretend to be local law enforcement or


investigators?

Eleven said yes at one point or another; only two said no.

043. Do the voices sound louder/clearer in one ear than the other? (If so,
which ear?)

Only five said the they were no louder/clearer in one ear than the
other; three said they were louder on the right side; three said that
they were louder on the left side; two answers were no clear.

044. Do the V2K talkers sometimes cause a clicking sound in one or both
ears?

Seven heard clicking in one ear or the other at some point; only five
got no clicking at all; one was unsure;

045. If you receive more than one voice, are they all the same volume and
seem to come from the same place? [For example, do you sometimes hear
a woman’s high-pitched voice screaming in the background, seemingly
from a distance?]

[I should have been more specific in my question. The answers are


difficult to determine.]

43
046. Does one of the voices sound similar to your own voice?

Only four stated that one of the voices sounded like their own voices.

047. Do the attackers stage scenarios or create skits and make you the
principal actor during your sleep?

Ten said that they do; two were unsure; one answer was not clear.

048. Do your attackers often whisper and talk in a very low volume that
allows you to hear only snatches of what they say?

Eleven said that they do; only one said no; one person did not answer
the question.

049. Do your attackers ever direct your thoughts to certain people, places,
or objects and then question you about them?

Only three said no.

050. Do your attackers appear to want to cause you sleep deprivation?

All thirteen said that they are sleep deprived to some extent.

051. Have the attackers ever spoken to you in other languages? If so, what
language?

Three said that their attackers had used another language; one said
that they caused him/her to speak in Russian.

052. If so, does that language have any particular significance in your life?

One of the three said that the language was that of his/her parents;
one said that it was a language that he/she took in high school and
college.

053. Do the attackers ever ask you about your ‘relationship” with a
particular individual or group?

44
Eight stated that they do.

054. Have you experienced a ringing in the ears (tinnitus) ever since you
first heard the voices?

All thirteen experience tinnitus.

055. Do the voices ever seem to come from the shower head or the
spewing water when you shower?

Seven hear the voices over the sound of rushing water.

056. Do your attackers especially bother you the night before an important
event? (a job interview, departure for a trip, etc.)

Only one stated no.

057. Do you sometimes wake at night with the attackers showing you
photos of people, places, or objects and interrogating you about them?

Ten said no.

058. Do they pretend to extort money from you or blackmail you?

Only four said no; one said that they did extort/steal money from a
relative.

059. Do they ever talk about places where you’ve lived or visited?

Only three said that their attackers did not mention other places.

060. Have they ever told or suggested to you why you were selected for
targeting?

Only one stated definitely no; others have gotten hints about the
reason.

Set 4 Tabulations

061. Do the attackers threaten to kill or harm your family members?

45
Only two said that the V2K attackers do NOT threaten to kill or harm
other family members.

062. Do the attackers tell you or have they told you that they’re going to
bankrupt you?
Ten said that they DO state that they’re going to leave them penniless.
063. Do the V2K attackers appear to be programming you to carry out a
particular objective or agenda (or to prevent you from doing so)?
All thirteen state that they believe the attackers are programming
them to do or not to do something.
064. Do you feel that the V2K attackers sometimes blank out your
thoughts?

Only one participant said that he/she did NOT believe that the
attackers could blank out his/her thoughts.

065. Have the attackers ever told you something or made you believe
something through their V2K that sent you on “wild goose chases” (perhaps
looking for bugs hidden in your house or locating a particular “perp” site)?
All thirteen participants stated that they had been sent on “wild goose
chases” by the attackers, although one participant said that it “rarely”
happened.
066. Have the attackers ever suggested or tried to make you believe that
you and some other person whom you know are actually one and the same
individual (dual personalities)?
Only four said that the attackers had tried to convince them that they
had a dual personality. [That tactic was a feature of MKUltra.]
067. Have the attackers ever said anything that suggested that they were
sorry for attacking you, suggesting perhaps that they were forced to attack
you?
Five participants said that the attackers had at some point
“apologized” for attacking them. One answer was not clear.

46
068. Have the attackers ever suggested a sexual intimacy between you
and them or made innuendos about going to have sexual relations with
you?
Only two stated that the attackers had NOT ever suggested a sexual
intimacy between them and the attackers.
069. Do you sometimes awake from the V2K sexually aroused (having
orgasm or an erection)?

Only one participant said that he/she had NOT awoken sexually
aroused. One answer was not clear.

070. Have you ever heard what seemed like actual voices talking about you
while in public but you could not see the speakers or the speakers’
mouths? (Perhaps their backs were toward you or you could see nobody at
all.)

Nine participants said that they had heard voices in public talking
about them but had not actually seen anybody talking.

071. Did you experience any physical effects before you started hearing the
voices?

Six did NOT experience physical effects before they began hearing
the V2K. Two could not remember any specific effects.

072. Did you experience any stalking before hearing the voices?

Four stated that they were NOT bothered by stalking before hearing
the voices. One was unsure.

073. Did the voices begin shortly after you broke up with a companion or
had intimate relations with a person?

Only four began hearing the voices after intimacy with a partner. One
answer was unclear.

074. Do the voices ever say anything about knowing you at an earlier age?
E.g., “We went to elementary school with you.” Or, "We went to high school
with you.”

47
Seven said that the attackers had suggested that they had known
them in the past.

075. Do the V2K attackers talk about events in your infancy and childhood
and try to make you feel guilt, remorse, anxiety, etc. about them?

Only one said that the attackers had NOT brought up instances in
his/her childhood and made to feel remorseful about them.

076. Do you feel like you have to clarify and articulate carefully your
thoughts and even explain them to the V2K attackers?

Eight stated that either now or in the past they felt compelled to
clarify their thoughts to the attackers. One answer was not clear.

077. Do you involuntarily (automatically) see the faces of people in your


mind whom the attackers cause you to think of?

Six said that they DO involuntarily see the faces of people whose
names are mentioned by the attackers. Two answers were unclear.

078. Do the attackers sometimes state a particular first name and you think
of all of the people whom you know by that name?

Eleven stated that they DO think or have thought of all the people by
the same name that the attackers mention.

079. In their talking, do the attackers pretend to identify with a particular


political party or other group?

Seven participants stated that their attackers do NOT mention


politics. Six said that they DO in one way or another.

080. Do your attackers pretend to represent some type of religion


(Christian, Jewish, Moslem, etc.)?

Only four said that their attackers do NOT give them any idea about
their religious beliefs.

48
081. Do you sometimes get cramps on some part of your body, particularly
while in bed at night?

Only one said that he/she does NOT get cramps sometimes on parts
of the body. One did not answer that question.

Set 5 Tabulations

082. Do the attackers tell you that you are going to hell?

Seven participants state that the attackers do NOT tell them that
they’re going to hell. Six say that they DO.

083. Do the attackers sometimes tell you that you’re going to jail or prison?

Only two have NOT been threatened with jail or prison.

084. Do the attackers address you by a particular pet/code name? (Mine is


“Estados Unidos,” Spanish for the United States.)

Only six say that they DO use particular code names for them.

085. Have the attackers told you or suggested to you who they are? If so,
who?

Only two state that their attackers have given them NO clues about
their identify. Quite naturally, the talkers will practice deception
concerning their identity.

086. Do the V2K attackers cause you to hear “word substitutions,”


especially in a sexual context? (For example, on TV, the radio, etc. instead
of hearing the word “request,” you hear instead the word “incest.” Likewise,
the word “text” becomes “sex.” Even sometimes you hear “three” instead of
“four” or “fifty” instead of “sixty.”)

Only three say that the attackers do NOT substitute words in their
hearing. One answer was unclear.

49
087. Have the attackers ever projected their voices to you that seem to
come from the TV or a radio? (For example, the TV newscaster is talking
about you.)

Only three state that their attackers had NOT ever sent their voices
through the TV or the radio.

088. Do the attackers sometimes make you forget where you put objects
and then belittle you for not remembering where you put them? (car keys,
cell phone, medicines, toilet items, etc.)

Ten say that their attackers DO make them forget where they put
objects.

089. Do the voices sometimes tell you that they are “responsible” for you,
suggesting that they’ve been assigned to monitor you?

Eight state that the voices DO suggest or have suggested that they
have been assigned to them. Five say they have NOT,

090. Do the attackers attempt to take credit for negative things that happen
in your life?

Only one says that the attackers do NOT take credit for negative
happenings.

091. Do the attackers ever express anger and frustration, perhaps over
something that you say or do?

All thirteen state that the attackers DO pretend to be angry and/or


frustrated over something that they think or do.

092. Do the attackers talk negatively about particular racial, ethnic, political,
social, or religious groups?

Only three say that the attackers do NOT talk about particular groups.

093. Do the attackers ever tell you that you’re “hardheaded” or stubborn?

50
Eight state that the attackers DO tell them or have told them that they
are stubborn.

094. Have the voices ever tried to convince you that you are crazy?

All thirteen say that at one time or another the attackers DO or have
tried to convince them that they are crazy.

095. Do you feel that your V2K attackers use Artificial Intelligence in their
talking? (A tale-tell sign of the use of AI is occasionally heard in the rapid
repetition of phrases and sentences several times in a row in the same
voice and manner.)

Only two feel that the attackers do NOT use AI in the voices heard.

096. Do the attackers use obvious recorded material along with their real
time talking? (If you hear the same statements in the same voice and
stated exactly the same way each time, it may be previously recorded.)

Only two believe that their attackers do NOT use previously recorded
material in the voices. One did not answer the question.

097. As the voices talk, do the attackers sometimes manipulate your sexual
organs?

Eleven state that the talkers DO manipulate their genitals. Only one
says that the talkers do NOT play with their sexual organs. One
states, “not usually.”

098. Do the attackers ever suggest that you are not patriotic?

Eight state that the attackers do NOT question their patriotism. Five
say that the talkers DO tell them that they are not patriotic.

099. Can you hear the voices when you are conversing with others,
watching TV, working, or are otherwise distracted?

Eleven hear the attackers’ voices even when they are engaged in
other talk or listening to TV/radio. One says “no.” Another one says,
“Not as clearly.”

51
100. Do the attackers talk about a particular person whom you know or
particular people whom you know over and over day after day?

Only two state that the attackers do NOT concentrate on a particular


person or on particular people continually.

101. Do the attackers try to convince you that you have committed a
particular crime or a sin?

All thirteen participants state that their attackers accuse them of a


particular crime or sin.

102. Are there indications that the attackers can read your
mind/thoughts?

Twelve participants are convinced that their attackers DO read their


thoughts/minds. One did not answer the question.

Set 6 Tabulations

103. Have you ever experienced anxiety or been treated for anxiety?

All thirteen participants have experienced anxiety that they feel is related to
their targeting.

104. Do you have psoriasis or have you ever been treated for psoriasis?

Only two have had psoriasis.

105. Do the voices try to destroy a meaningful relationship with a


partner, a close relative, or perhaps a best friend?

All thirteen state that the V2K attackers have tried to destroy a
relationship of some type with a friend or relative.

106. Do you talk back to or dialog or have you ever talked back to or
dialoged with your attackers through the V2K?

All thirteen have dialoged with their V2K attackers.

52
107. Do the attackers ever use the expression “(Name of a person) is crazy
about you?” Or “(Name of a person) wants you?”

Nine participants have been told that somebody is crazy about them or that
someone wants them.

108. Do the attackers ever suggest or tell you that you are sexually
attracted to a person who is no longer living?

Only one participant’s attackers try to make him/her believe that he/she is
sexually attracted to a person no longer living.

109. Have the attackers ever attempted to disfigure you or threatened


that they had the capability of disfiguring you and making you
unattractive?

Ten participants state that their attackers try to or actually make them
look unattractive.

110. Do you feel an overpowering craving for food (although you are not
actually hungry)?

Eight feel a craving for food despite not actually being hungry.

111. Have the attackers ever told you that they were coming to harm you or
sending someone to harm you (E. g., that they are sending a “Death
Squad”)?

Eleven participants have been threatened with harm.

112. Have the attackers ever threatened to burn down your domicile?

Only five participants have been told that the attackers were going to burn
down their domicile.

113. Do the attackers try to convince you that certain family members are
plotting against you?

53
Ten have been told or led to believe that particular family members were
plotting against them.

114. Have the attackers ever led you to believe that you had supernatural
powers (E.g., having visions that give you the answers to targeting
questions)? [I was once led to believe that I could detect and locate
microchip implants in other targets.]

Nine participants have been led to believe that they had supernatural
powers.

115. Do the attackers ever suggest that if you do a certain action or think in
a certain way that they will cease their attacks?

Eight have received suggestions by the attackers that if they take certain
actions or change their views that their attacks would end.

116. Are there any indications that make you think that your attackers are
very well educated?

Only five believe that their attackers may be well educated. One states that
they seem to be “somewhat” educated.

117. Do you ever hear recordings of professional-sounding speakers or


“sermons” (other than the regular V2K speakers)?

Only two participants hear what they believe may be recordings of


professional speakers or “preachers” other than their regular V2K
speakers.

120. Do the attackers often give you commands when they know that you
are going to do that action anyway (washing your hands, brushing your
teeth, closing the door, turning out the lights, etc.)?

Only three are NOT given commands to do what they would ordinarily do.
One states that they tell him/her what he/she is going to do after he/she
has decided to do it.

54
121. Have the attackers ever pretended that you could do them harm or
frighten them by using your mind? (E.g., sending bolts of lightning to strike
them or causing a roaring fire that consumes them.)

Only three have been led to believe that they could harm or frighten their
attackers by using their minds.

122. Do you receive or have you ever received electrical-like jolts to your
body?

Only one participant does NOT get electrical jolts at times.

123. Do you sometimes get finely-focused “touches” or “brushes” on your


face, usually while you’re sitting or in bed, that sometimes cause a slight
numbness or a tickling?

Eight sometimes feel touches on the face that make the spot seem numb
or tickle. One answer was not clear.

Set 7 Tabulations

124. Do your attackers ever cause or have they ever caused your heart to
race abnormally?

All thirteen participants experience or have experienced an abnormally


racing heart.

125. Do your attackers ever repeat your words as you think them? (E. g.,
although I pray silently, my attackers often repeat my prayer as I pray.)

Twelve have their thoughts repeated by the V2K attackers. Only one does
not.

126. Do you ever think of a song or something that you heard and you
continually think about that afterward? [E. g., my attackers caused me to
think of the song “You’re Always on My Mind,” and I heard it in my mind for
days afterward.]

All thirteen have a song or a thought repeated continually afterward for


days.

55
127. Do “glitches” that you know are not natural “glitches” occur on your
computer?

Twelve participants experience computer “glitches” that they do not believe


are natural. Only one does not.

128. Do the attackers ever cause you to believe that a member of your
family is being sexually molested or is sexually molesting another person,
usually a child?

Only two have had the V2K speakers tell them that family members are
somehow involved in sexual molestation.

129. Do the attackers ever criticize something that you said to somebody
or thought about somebody and try to make you feel guilty over it?

Twelve are criticized and made to feel guilty by their V2K attackers about
what they say or think. Only one is not.

130. Do the attackers ever tell you that you are very smart/intelligent?

Ten are told or have been told that they are very smart or intelligent.

131. Do the attackers ever try to make you think that certain foods,
beverages, and medicines in your domicile have been tampered with?

Twelve participants have been led to believe that food and/or medicines in
their domicile have been tampered with. Only one has not.

132. Have the voices ever made you believe that there are listening
devices or cameras planted in your domicile?

Only one has NOT been led to believe that cameras and listening devices
are planted in the domicile. One said that although he/she was not told that,
he/she had found those devices hidden in the domicile.

133. Do the voices ever seem to come over air conditioning ducts, motors,
or other electrical objects?

56
Eight participants have heard the voices over various objects. Five have
not.

134. Do the attackers sometimes state a particular year and then continue
to talk and/or question you about that year?

Ten have NOT been told a specific year and questioned about it. Three
have been.

135. Have the attackers ever tried to convince you that you were having a
heart attack or a stroke?

Nine have been led to believe that they were having either a heart attack or
a stroke, Four have not.

136. Do your attackers ever make reference to time, like “four thousand
years ago, etc.” or “twelve years ago”?

Nine have NOT heard the V2K attackers state a number of years ago. Four
have.

137. Do your attackers ever say a number and then cause you to think
back when you or your children were that age or think of something else
relating to that number?

Eight have had the attackers state a particular number and have been led
to think about anything related to that number. Five have not.

138. Do the attackers suggest that they have also targeted a relative of
yours or a good friend?

Ten have been told or led to believe that a relative or a good friend was
also targeted. Three have not.

139. Have the attackers ever threatened to send you to the “hospital” or the
“emergency room?”

Ten have been threatened with being sent to the emergency room or to the
hospital. Three have not.

57
140. Do the attackers lead you to believe that others are making fun of
you?

Twelve are led to believe that others make fun of them. Only one is not.

141. Do the attackers try to convince you that you are ugly, that you’re fat,
that you smell bad, or are otherwise undesirable?

All thirteen hear or have heard from their attackers that they are ugly or
otherwise undesirable.

142. Do the attackers encourage you to eat the wrong kinds of food or
perhaps eat and drink too much?

Seven participants are encouraged to eat or drink in access or to eat the


wrong kinds of good. Six say that they are NOT.

143. Do you sometimes hear other voices that you think that you are not
supposed to hear underlying or superimposed over or in the background of
the usual V2K?

Nine have at some point heard voices that they thought that they were not
actually supposed to hear. Four have NOT.

144. Do the attackers refer to you as being gay, try to make you believe
that you are gay, or tell you that others believe that you are gay?

Ten have had their V2K attackers suggest or attempt to convince them that
they were gay and/or that others thought that they were gay. Three have
NOT.
Set 8, Tabulations

145. Do your attackers ever cause or have they ever caused your heart to
race abnormally?

All thirteen participants experience or have experienced an abnormally


racing heart.

58
146. Do your attackers ever repeat your words as you think them? (E. g.,
although I pray silently, my attackers often repeat my prayer as I pray.)

Twelve have their thoughts repeated by the V2K attackers. Only one does
not.

147. Do you ever think of a song or something that you heard and you
continually think about that afterward? [E. g., my attackers caused me to
think of the song “You’re Always on My Mind,” and I heard it in my mind for
days afterward.]

All thirteen have a song or a thought repeated continually afterward for


days.

148. Do “glitches” that you know are not natural “glitches” occur on your
computer?

Twelve participants experience computer “glitches” that they do not believe


are natural. Only one does not.

149. Do the attackers ever cause you to believe that a member of your
family is being sexually molested or is sexually molesting another person,
usually a child?

Only two have had the V2K speakers tell them that family members are
somehow involved in sexual molestation.

150. Do the attackers ever criticize something that you said to somebody
or thought about somebody and try to make you feel guilty over it?

Twelve are criticized and made to feel guilty by their V2K attackers about
what they say or think. Only one is not.

151. Do the attackers ever tell you that you are very smart/intelligent?

Ten are told or have been told that they are very smart or intelligent.

152. Do the attackers ever try to make you think that certain foods,
beverages, and medicines in your domicile have been tampered with?

59
Twelve participants have been led to believe that food and/or medicines in
their domicile have been tampered with. Only one has not.

153. Have the voices ever made you believe that there are listening
devices or cameras planted in your domicile?

Only one has NOT been led to believe that cameras and listening devices
are planted in the domicile. One said that although he/she was not told that,
he/she had found those devices hidden in the domicile.

154. Do the voices ever seem to come over air conditioning ducts, motors,
or other electrical objects?

Eight participants have heard the voices over various objects. Five have
not.

155. Do the attackers sometimes state a particular year and then continue
to talk and/or question you about that year?

Ten have NOT been told a specific year and questioned about it. Three
have been.

156. Have the attackers ever tried to convince you that you were having a
heart attack or a stroke?

Nine have been led to believe that they were having either a heart attack or
a stroke, Four have not.

157. Do your attackers ever make reference to time, like “four thousand
years ago, etc.” or “twelve years ago”?

Nine have NOT heard the V2K attackers state a number of years ago. Four
have.

158. Do your attackers ever say a number and then cause you to think
back when you or your children were that age or think of something else
relating to that number?

Eight have had the attackers state a particular number and have been led
to think about anything related to that number. Five have not.

60
159. Do the attackers suggest that they have also targeted a relative of
yours or a good friend?

Ten have been told or led to believe that a relative or a good friend was
also targeted. Three have not.

160. Have the attackers ever threatened to send you to the “hospital” or the
“emergency room?”

Ten have been threatened with being sent to the emergency room or to the
hospital. Three have not.

161. Do the attackers lead you to believe that others are making fun of
you?

Twelve are led to believe that others make fun of them. Only one is not.

162. Do the attackers try to convince you that you are ugly, that you’re fat,
that you smell bad, or are otherwise undesirable?

All thirteen hear or have heard from their attackers that they are ugly or
otherwise undesirable.

163. Do the attackers encourage you to eat the wrong kinds of food or
perhaps eat and drink too much?

Seven participants are encouraged to eat or drink in access or to eat the


wrong kinds of good. Six say that they are NOT.

164. Do you sometimes hear other voices that you think that you are not
supposed to hear underlying or superimposed over or in the background of
the usual V2K?

Nine have at some point heard voices that they thought that they were not
actually supposed to hear. Four have NOT.

165. Do the attackers refer to you as being gay, try to make you believe
that you are gay, or tell you that others believe that you are gay?

61
Ten have had their V2K attackers suggest or attempt to convince them that
they were gay and/or that others thought that they were gay. Three have
NOT.
Set 9 Tabulations
166. Does one of the voices sound like somebody you know, perhaps a
relative, friend, or neighbor?

Eight have heard voices that sounded like somebody they knew. Five have
not.

167. Have your attackers ever insisted that you apologize to someone (but
they do not necessarily state why you should apologize)?

Eight have been told to apologize to someone for something. Five have
not.

168. Do your V2K speakers tell you that a family member or friend is
having a “nervous breakdown” or is losing his/her mind?
Only four have been told that someone they know is having a nervous
breakdown. Nine have not.
169. Have you ever seen in the night skies large stationary drones near
your house? [The drones can be easily spotted. They look like two bright
stars very close together on a horizontal plane. If you look more closely, in-
between the two bright lights at the bottom you can faintly see other far
smaller lights. They’ll usually be red, green, and natural colored. If the sky
is clear, the drones will be seen before the real stars appear.]
Seven have not seen drones. Six have seen them.
170. Have your V2K speakers ever said anything that suggests that they
are monitoring your heart beat, blood pressure, and other bodily functions?
[For example, whenever I am occasionally startled by a loud sound, an
obvious recording by my attackers states, “That scared the shit out of him!”]
Ten feel that their bodily functions are being monitored. Three do not.
171. Since you have been receiving the V2K, have you noticed
ripples/pulses in the calves of your legs or on other parts of your body?

62
Eleven have received ripples/pulses in their legs or other parts of the body.
Two have not.

172. Do you ever feel a kind of current that seems to be flowing through
your limbs or in other parts of your body?

Twelve have felt what seemed like a current flowing through their body.
Only one has not.

173. Have your attackers ever tried to convince you while you were in bed
that someone else was in the room in the darkness?

Seven have been led to believe that someone else was in the room with
them after they retired for the night. Six have not.

174. Have your attackers ever tried to make you think that a neighbor,
friend, or relative was responsible for some missing item?

Eight have been led to believe that a neighbor, friend, or relative was
responsible for a missing item. Five have not.

175. Do your attackers sometimes cause an artificial tickling or scratching


in your throat or nose that causes you to cough or sneeze involuntarily?

Eleven feel an artificial tickling or scratching in the throat or nose. One has
not. Another one was not sure.

176. Do you sometimes feel a tickling on the inside of your nostrils, your
ears, or in your eyebrows? [Hairs are believed by many targets to serve as
antennas.]

Twelve sometimes feel a tickling in hairs of nostrils, ears, or eyebrows.


Only one does not.

177. Does your scalp often itch and you find yourself clawing it, sometimes
waking from sleep to do so?

Seven feel intense itching on the scalp. Six do not.

63
178. Have your speakers made statements that hint at their location? [The
V2K speakers sometimes inadvertently give clues about their whereabouts.
For example, one morning, one of my speakers stated that it was 6:00am.
It was actually 7:00am my time (Central). Thus, I knew that unless he was
being deceptive--and they are indeed masters of deception--he was in the
Rocky Mountain Time Zone.]
Seven have heard hints concerning the attackers’ locations. Five have not.
One answer was not clear.
179. Do your V2K speakers ever make statements or use the power of
suggestion obviously intended to affect your appearance? If so, please give
an example. [My V2K attackers often make the statement while I am
sleeping, “Look at the frown on his face!” They obviously are trying to
cause deep wrinkles on the forehead and face.]
Ten receive attackers’ statements or the power of suggestion to affect their
appearance adversely. Two do not. One answer was not clear.
180. Would you say that your V2K has intensified since it first began?
Seven believe that their V2K is now worse. Four say that it is not. Two say
that it is less than it was originally.
181. Has your natural sense of hearing diminished since you first received
the V2K?
Seven have not had their hearing affected. Six have had their hearing
damaged.
182. Are the voices equal in volume both inside and outside your domicile?
Eleven say that the volume is about the same both inside and outside. Two
state that it is not.
183. Do your V2K speakers ever tell you that loved ones or friends are
unfaithful to their partners and are cheating on them?
Seven are not told that a friend or loved one is unfaithful to his/her partner.
Six have been told that.
184. Have the V2K attackers ever shown that they’ve hacked your phone?
[For example, they use your phone numbers to call others and you find out

64
about it. Or you get a phone call and don’t answer. When you call that
number back, it is “disconnected or no longer in service.”]
Twelve have had their phone obviously hacked. One has not.
185. Do your attackers talk negatively about any particular group or
groups?
Ten hear negative comment from their attackers about particular groups.
Three do not.
186. Do your V2K speakers sometimes give you commands or use the
power of suggestion while you’re sleeping to make you do something? [For
example, they will often tell me “You have to go pee.” That, of course,
wakens me. Usually, I do have to go to urinate.]
Nine are given commands by their attackers about ordinary tasks that they
would be anyway. No are not. Two answers were not clear.
Set 10 Tabulations
187. Have the V2K speakers ever said anything that makes you think that
they may be religious or spiritual?
Eight participants have heard nothing from the V2K attackers to make
them think that the attackers were religious or spiritual. Three are told
that the attackers are Satanists. Two say that the attackers pretend to
be religious/spiritual.
188. Have your attackers ever shown any indication of compassion for you
in their attacks?
Seven have heard some degree of compassion expressed at some
point by the attackers. Six have not.
189. Have you ever asked your attackers why they targeted you?
Twelve have asked their attackers why they are targeted. One has not.
190. Have the attackers ever told you or suggested that they can see out of
your eyes? [For example, one day I forgot to remove my sunglasses when I
came in from outside. Shitface later said, “Take off those f—king shades!”]

65
Eleven have been led to believe that the attackers can see through
their eyes. One has not. Another one has not been told that they can
but he/she believes that they can.
191. Have the attackers ever told you that they can see everything that you
do?
Twelve have been convinced that the attackers can view everything
that they do. Only one has not experienced that.
192. Are you bothered by “restless legs,” especially when you sleep?
Eleven are bothered by restless legs after they retire for the night.
One has restless legs during the daytime but not at night while he/she
sleeps. One answer was unclear.
193. Have the attackers ever suggested or showed signs that they can see
through your own eyes?
Sorry, this question is very similar to 190.
194. Do the attackers mention a particular person’s name and attempt to
cause a sexual arousal?
Eight have had their attackers mention a particular person’s name
and then try to cause a sexual arousal in them. Five have not.
195. Have the attackers ever caused you to believe that they have a
panoramic view of everything that you do and everywhere that you go? [For
example, recently I forgot to take off my sunglasses when I came inside.
The main speaker later said, “Take off your f—king shades!”]
Nine believe that their attackers can see them wherever they go. Two
do not. One answer was unclear.
196. Do you ever feel the sensation of pinpricks on your body?
Twelve have felt pin pricks on the body. One has not.
197. Have you ever visited a psychiatrist or a psychologist because of your
targeting?
Twelve participants have visited a psychiatrist about their targeting.
Only one has not.

66
198. Since your targeting, have your eyes become extremely sensitive to
sunlight or bright lights?
Nine targets’ eyes are very sensitive to sunlight or bright lights due to
their targeting. Four targets’ eyes are not.
199. Have the attackers ever caused you to smell something that is not
normally found within your environment?
Twelve have smelled something that is not in their ambience. One has
not.
200. Have your attackers ever said anything that might indicate that they
are homophobic?
Nine say that their attackers appear to be homophobic. Two state that
they do not. One states that they at times have suggested that they
are both gay and non-gay. Another one believes that the attackers are
gay.
201. Have your attackers ever said anything that suggests that they are
xenophobic?
Ten say that the attackers suggest that they are xenophobic. Three
state that they do not.
202. In your interaction with the V2K speakers, do you insult and ridicule
them?
Twelve insult and ridicule the attackers. One does not talk to the
attackers.
203. Have the attackers ever caused you to see frightening holographic
images, particularly while you sleep?
Eleven have seen holographic images during their sleep; however, in
two cases they were not frightening. Two have not.
204. Do you attackers sometimes cause vibrations in your stomach or
otherwise cause problems with your stomach or digestive system?
All thirteen have digestive problems.
205. Are you often constipated and there appears to be no reason for your
constipation?

67
Nine have had constipation problems. Four have not.
206. Do your attackers discourage your social activities with friends and
relatives?
Ten are discouraged by attackers to engage in social activities with
others. Three are not.
207. Do your attackers attempt to make you take the wrong exit or
otherwise disorient you while you are driving?
Eight are made to take a wrong turn or are disoriented while driving.
Two are not. Two do not drive autos. One did not answer the
question.

68

Common questions

Powered by AI

V2K technology is effective in achieving attackers' goals as it can invisibly manipulate psychological states and subtly implant suggestions in the victims' minds, unlike overt physical methods. V2K induces paranoia and isolation without leaving physical evidence, enabling attackers to target victims continuously over great distances. The psychological impact is profound and lasting, as it targets the core of individual autonomy and mental health, fulfilling the attackers' aims of control more effectively than physical methods alone .

'Psychic driving' was developed by Canadian psychiatrist Ewen Cameron in collaboration with the CIA during the 1950s. This program involved methods such as forced listening to recorded materials and sleep deprivation to break down subjects. Its relevance to V2K attacks lies in the similar use of psychological manipulation techniques to achieve control over individuals by inducing anxiety and impairing cognitive functions. These attacks echo Cameron's methods by emphasizing mental over physical torturous impacts .

V2K attackers exploit targets' relationships by making threats against family members, suggesting others are also being targeted, and implying surveillance extends to the victims' social circles. They manipulate perceptions of loyalty and trust, aiming to isolate the target socially. This exacerbates the victim's sense of paranoia and helplessness, increasing their dependence on the false narratives constructed by the attackers, ultimately consolidating the attackers' psychological control .

Attackers use deception in V2K attacks by pretending to be law enforcement or investigators and making victims believe they are under constant surveillance. The implication is that victims are left feeling helpless and unable to trust their perceptions of reality. This deception fosters a state of anxiety that effectively disrupts the victim's ability to think critically and confidently, aligning with the attackers' goals of controlling the victim's thoughts and actions .

The manipulation of victims' sexual organs in electronic targeting induces feelings of shame and guilt, contributing to the victims' psychological burden. This tactic diminishes the victim's sense of control over their own body, heightening feelings of anxiety and helplessness. It supports the attackers' broader objectives by increasing psychological vulnerability and compliance, making it easier to manipulate victims in other areas of their lives .

Electronic targeting can be classified into several forms: (1) The first form uses highly classified devices to produce physical effects from a remote location. (2) The second form involves creating neurological or psychological effects, also from a distance. (3) Most targets experience both physical and neurological effects. This method uses voice-to-skull (V2K) technology. (4) The fourth form involves on-site harassment, including organized stalking and disruption of daily life activities, referred to as gang stalking or overt harassment. The study focuses on the first three forms, which are remote and do not involve physical contact, potentially occurring over large distances .

Gang stalking involves direct, on-ground harassment methods such as vandalism, spreading rumors, and physical surveillance, where attackers are often visibly present or can be perceived by the victims. In contrast, V2K attacks operate invisibly from a distance, utilizing technology to deliver voices and induce neurological effects without the attacker being seen or known to the victim. While gang stalking relies on social and environmental disruptions, V2K primarily leverages unseen technological manipulation for psychological torment .

Researchers counter the mass hysteria argument by highlighting the geographical and experiential diversity among victims, who independently report similar attacks and symptoms. This undermines the likelihood of a collective psychological phenomenon. Furthermore, victims often experience symptoms before seeking out others or information, which suggests external causation rather than self-generating paranoia. Critics fail to provide a consistent alternative explanation that aligns with the widespread reports and technical specifics of attacks .

V2K attackers rely primarily on psychological effects to exert control over their victims, often by inducing anxiety to impair rational thinking and physical health. They pretend to be authoritative figures like law enforcement to intimidate victims and use familiar voices and personal information to deceive them about the attacker's true identity. Historical precedent for these methods includes Ewen Cameron's 'psychic driving,' a method developed for the CIA involving psychological manipulation and physical discomfort to break down victims' resolve .

Common psychological effects include inducing feelings of guilt, shame, and anxiety, manipulating thoughts, and employing various threats, such as suggesting victims will go to jail or harm will come to their families. Physically, victims often experience discomfort and bodily monitoring. Psychology plays a significant role in reinforcing control, as it undermines self-worth and increases the victims' sense of helplessness, achieving the attackers' objective of controlling and breaking down the victim's resolve .

You might also like