v2k Study IV Summary
v2k Study IV Summary
Executive Summary
Many people claim that they hear voices that are not theirs and that they
are the only ones who can hear them. Those voices are sometimes called
synthetic telepathy, subliminal voices, and other names, but they are
generally referred to as V2K, or voice-to-skull. The voices are transmitted
to those persons from afar, or by remote, which means that the person or
group sending the unwanted voices are unseen and the devices/methods
that they use are unseen and largely unknown.
This is the fourth of a series of studies made of the voices. The purpose of
this study is to examine the content of those voices to learn more about the
tactics that the attackers use in their verbal assault. The study does not
attempt to identify the attackers or the weapons that they use. Instead, it
only analyzes what the attackers say and how they say it.
This study attempts to broaden the knowledge of the reader concerning the
phenomenon of the voices and at the same time dispel some of the beliefs
that many doubters hold about those voices.
1
Targeting
The attack process is called targeting, the end result of which is expected
to be the neutralization of the victims. Neutralization can mean modifying
their thought process and their behavior, totally isolating the targets,
sending them to mental institutions or prisons, or causing their eventual
deaths. We refer to the people behind the targeting as the attackers, or
perpetrators, and the victims of the attacks as targets, targeted individuals,
or simply TIs.
The result of electronic targeting can only be seen as torture. Many targets
believe that the targeting is a spin-off of neurological warfare experiments
conducted by the military and the intelligence agencies of the US and other
countries. While the genesis of electronic targeting may have come from
one single source, over the years, the method and the devices used to
carry out the targeting have doubtlessly fallen into various other hands.
2
already been suffering from those effects before they begin researching
and communicating with other targets on the web.
Targeting takes several forms: (1) One form employs yet highly classified
devices that can focus and fix upon a person to pound him by remote with
many physical effects. (2) Another form of targeting consists of using
similar devices to focus and fix upon a person to achieve a myriad of
neurological, or psychological effects, also by remote. (3) Probably most
targets receive both the physical and the neurological effects.
(4) Still another form concentrates on harassing the target on-site in various
manners: using organized stalkers against him; vandalizing his property;
making surreptitious entries into his domicile; tampering with his postal
mail, his computer, and his telephone; strewing rumors about him in his
neighborhood and work place, and employing other forms of harassment.
That form is often referred to as gang stalking, organized stalking, or overt
harassment (OH).
This study concerns only the first three forms. Those forms operate by
remote methods, which means that the attackers are not seen and the
attackers’ device or devices do not touch the body. The first two forms
function in tandem with each other. The remote distance can be only
meters away from the target or hundreds, perhaps thousands of miles
away. The farthest range has not yet been determined by targets.
The fourth form of targeting is performed on the ground in and near the
target and the target’s surroundings. The voices are used only in the
second and third forms of targeting. This study touches upon the first three
forms of targeting but focuses on the voices found in the neurological
torture.
The victims’ statements about their targeting and its effects suggest that
there are several reasons that persons are targeted:
1. Experimentation
Studies suggest that the physical and neurological capabilities of the attack
weapons, whatever they may be, are already well proven. However, those
3
capabilities remain to be tested on the many characteristics of human
targets. Imagine the diversity of the population. How do people who
represent that diversity react to the many facets of V2K assault?
For example, how does a particular feature of the V2K attacks affect a
person of Asian descent versus a person of Caucasian descent? How does
a person who did not finish high school respond to a particular feature of
V2K attacks opposed to a person with a PhD? All of those variations are
extremely important in the application of V2K for neurological warfare,
behavior and thought modification, population control, and other purposes.
Research on the brain is still ongoing. There are thousands of nerves and
nerve clusters whose functions have not yet been identified. In research
conducted on the brain and the nervous system for purposes of
neurological warfare, every finding must be tested on the multiplicity of the
population to determine how it affects every element of that population.
This is only rarely the reason for targeting; yet, there are targets who
present credible evidence that various individuals or institutions have
targeted them or relatives to rob them of money or other assets.
4. Sowing Discord
4
other countries and to sow suspicion of the governments and discord
among their citizens. Countries with that capability include the US, the UK,
Israel, Russia, China, and perhaps India and others.
5. Amusement
Many targets believe that they are objects of virtual “reality shows” seen by
viewers over the Dark Web. Although there is no proof of this, some of the
tactics of the attackers could be interpreted as being designed for remote
viewing by voyeurs.
The Capabilities of the Attackers
Physical Targeting Effects
Although this study concerns the voices, in addition, the attackers’ devices
can cause an extraordinary variety of physical effects, some of them only
annoying and others, life threatening. As already mentioned, many of the
effects are also natural-occurring symptoms experienced by many people;
thus, the claims made by targets cannot be proven.
Here are some of the physical effects that the remote attackers are able to
cause. This list is not exhaustive. Other targets can doubtlessly suggest
additions to this list.
-- sensation of pin pricks in the eyes, shoulders, face, feet, elbows, and
other areas.
-- intense pressure on the bridge of the nose. The constant pressure is
intended to lay the groundwork for inducing anxiety.
-- restless legs. A sensation begins in the small of the back and extends
into the extremities, causing the “restless legs” syndrome. Sometimes
when that happens, the legs will jerk involuntarily.
-- hunger pains in the stomach, even when the target should not be
hungry.
-- electrical-like jolts. These affect the entire body and feel much like the
shock that one gets from touching a low voltage electrical fence.
-- tremors, or vibrations. These can affect the whole body or be focused on
specific parts of the body. They can range from very mild to violent.
5
-- zapping in/on the head. These sound much like sparks from a welder’s
torch or like children’s sparklers used as fireworks on holidays.
-- a “heaviness” in the chest that makes one feel always tired.
-- clicking in the ears.
-- severe cramping, mainly in the calves of the legs.
-- numbness in the limbs from the base of the spinal column to the toes.
-- unnatural coughing and sneezing.
-- extreme gastric problems, leading to irritation of the stomach lining and
infections in the esophagus and the duodenum.
-- stomach aches and pains, indigestion, nausea, and dizziness.
-- gas on the stomach and in the intestines.
-- lethargy and listlessness. I suspect that many people suffering from
Chronic Fatigue Syndrome (CFS) are actually victims of remote torture.
CFS was not identified until the 1980s.
-- tinnitus. Almost every target who receives the voices also suffers from
tinnitus.
-- inability to urinate or frequent urination.
-- chronic constipation.
-- sleep deprivation.
-- simulated “faux” heart attacks.
-- the sensation of crawling insects on the face and neck.
-- intense itching. This can be any place on the body. The attackers often
will make it seem much like a mosquito bite or a fire ant bite. The itching
is normally on the hands or the feet.
-- twitching of the fingers. The attackers not only want to annoy you but
also convince you that you are developing Parkinson’s disease.
6
-- destabilization of hand-to-eye coordination, causing targets to strike their
hands against objects, misstep, bump against objects, stumble, and
misjudge their distances.
-- inability to open one eye or the other in the morning.
-- twitching eye lids.
-- throbbing in the head.
-- aches and pains in various parts of the body. The attackers can also
cause arthritic-type pain in the hands, pains in the lower back, and
extreme pain in the legs by striking the sciatic nerve.
-- unnatural salivation.
-- conversely, dry mouth.
-- tingling vibration focused on areas of the face, often causing basal cell
cancer.
-- involuntary physical movements. Targets have suffered serious falls,
when the devices caused their knees to buckle. The attackers’ device
can also cause the arms and legs to flail and jerk involuntarily.
-- heart flutters and irregular palpitations.
-- extreme sensitivity to light.
-- pressure on the bladder, causing the victim to want to urinate very often.
Conversely, the attacker can prevent a target from urinating.
-- unexplained sores in various areas.
-- high and sudden temperature rises in the body.
– “stopped-up” hearing canals.
-- pressure (causing numbness) on bridge of nose, the kidneys, and the
prostate.
-- intense itching on the scalp. This is sometimes preceded or followed by
pin pricks on the scalp.
-- constriction in the esophagus and hiatal hernia.
7
-- “faux” heart beat that occurs on the back opposite the heart or on the
head.
-- electrical-like buzz in the groin and on hips.
-- artificial heating of the body.
-- acute pain on hands and feet. In the latter, attackers like to concentrate
on the callused part of the sole, usually the part near the smallest toe.
-- numbness and rigidness of feet, including the toes. The attackers can
cause what appears to be neuropathy by reducing the circulation in the
toes and the feet. Neuropathy causes the victim to be unsteady on his
feet and reduces his ability to get around.
-- unnatural plucking of the lips, usually the upper lip.
-- nasal drip.
-- tingling in calves of legs.
-- Hear and record one’s conversations along with those with whom one
talks.
-- Record a person’s voice and then later simulate that same voice.
-- See through the victim’s eyes what the victim sees.
-- View the interior of the target’s body and zoom in on any part or organ of
the body, even in the darkness. EKG, CT scans, and functional MRIs can
be performed on targets by remote.
8
-- Induce dreams, stage scenarios, and engage in subliminal (telepathic)
interrogations.
-- Inject holographic pictures or images into a victim’s thoughts.
-- Implant false memories in victims.
-- Cause the target financial problems, ruin his credit, and drive him into
bankruptcy. Keep in mind that most targets live on fixed incomes and
most of them have to live frugally. Yet, the attackers employ a bag of
tricks designed to drain the target financially through the following
actions.
Making the target spend thousands of dollars on remedies and gadgets
that he thinks may shield him from the effects of targeting and causing him
to hire detectives to investigate the targeting and initiate useless lawsuits.
Causing the target to make mathematical errors on his taxes and
other documents that result in substantial losses.
Affecting the target’s judgment that ends in his making faulty and
costly decisions.
Destroying expensive household and other items, making targets
have to replace them.
Distracting the target so that he forgets to pay bills on time, leading to
his paying costly penalties.
Creating problems with the electrical system and mechanical devices,
especially computers and printers, which targets have to hire
technicians to repair.
Urging the targets through their voice-to-brain subliminal suggestions
to buy expensive needless items.
Fomenting personal and other problems that require that targets hire
lawyers. A TI correspondent wrote about her taking videos of
neighbors overtly harassing her and then being arrested for that
action. She had to hire a lawyer to get out of jail. Of course, nothing
happened to the harassers. Moreover, now that law abiding citizen
has an arrest record that will follow her to the grave.
Sending targets to hospital emergency rooms due to physical
problems they cause with their devices. One TI correspondent rushed
to the ER on at least three occasions when the attackers caused her
throat to constrict, keeping her from breathing. Most medical
insurance policies do not pay the total costs.
9
Ruining the targets’ credit. The manipulators and their accomplices
will steal credit card and other statements from the targets’ mail
boxes or “lose” them in the postal system, causing targets to pay late
fees; by whispering into the targets’ brains, make them forget to pay
bills; and interfere with the targets online payments to cause them bill
payment problems.
Robbing targets of their time by harassing them continually with
electronic assault and mind control, thus keeping them from tending
to their business affairs. Very often targets lose their jobs because of
the targeting distractions in their lives.
Causing targets financial ruin is crucial to the aims of the attackers. Broke
people are usually harmless and defenseless. Many of the targets with
whom I have corresponded have depleted their savings and have gone into
bankruptcy because of the attackers. Others have been forced into
homeless shelters and still others have become virtually street people. The
attackers set out to ruin targets financially, and they often succeed.
-- Discredit the target by causing him to react in strange ways to the
targeting, which in turn makes him appear insane or demented. Because of
the target’s odd actions, he is often forced by the authorities to undergo
psychological evaluations. Most of the time, those evaluations result in the
target’s being labeled schizophrenic. Once he is diagnosed as
schizophrenic, he loses all credibility.
-- Monitor and manipulate the target’s emotions and cause mood swings in
targets. The attackers will often fill the victim with emotions that cause
moods that range from explosive anger to total complacency. Those mood
swings are seen by many observers as a mental disorder.
-- Read a victim’s thoughts. There is irrefutable proof that university,
medical, independent researchers, and defense contractor scientists have
developed various devices and methods that, when operated with
computer programs, are capable of reading human thought. Many of those
methods have been patented. Other methods were probably grabbed by
the U.S. Government before they were patented. In reality their device
actually intercepts a target’s thoughts several seconds BEFORE the target
becomes aware of the thoughts.
10
The mind reading capability not only gives stalkers access to everything in
the victim’s mind but also provides them massive amounts of information
about friends and family members of victims. The stalkers feverishly exploit
this information 24/7. Knowing targets’ thoughts also gives the stalkers
computer passwords (and thus control over my communications),
information about business matters, and previous knowledge of actions and
movements.
-- Transmit voices into the brain/head that only the victim can hear. Targets
usually refer to this as voice-to-skull (V2K) and sometimes as subliminal
speech, synthetic communication, telepathic communication, or microwave
hearing. The US Government began experimenting with the voices back in
the 1940s.
The capability of producing voices by remote was first described by
scientist Allan H. Frey in an article called ‘Human Auditory System
Response to Modulated Electromagnetic Energy” in 1961 in the Journal of
Applied Physiology. By the mid-1970s, beaming voices and other sounds
into people’s heads or brains by remote was an unchallenged reality. This
is not conjecture but a proven and undeniable fact.
Plausible Deniability
Unfortunately for targets, most of the conditions or effects caused by their
attackers also occur naturally in humans. The difference is that with targets,
their conditions/effects are induced by their attackers. However, the
attackers know that targets cannot prove that their conditions/effects are
not natural but are induced.
Voice Transmissions
11
voices, and there is no known way to prevent the voices from being heard.
Victims have come to call those voices a variety of names, such as voice-
to-skull (V2K), microwave hearing, microwave auditory effect, electronic
telepathy, synthetic telepathy, audio subliminal messages, and the Voice of
God.
In addition to transmitting voices, the attackers can also mimic and project
many other sounds into the domiciles of the victims and into their
surroundings, for example, sounds of doors slamming, birds cooing (when
there are no birds), dogs barking (when there are no dogs), unexplained
thuds against the wall, telephones ringing, doorbells chiming, loud popping
noises, people shouting, and many other sounds. The sounds and voices
normally occur whenever the targets are alone.
Psychiatrists, Enemies of Targets
Persons who state that they hear voices are routinely considered by law
enforcement and others as psychotic. In fact, authorities often require that
the auditory targets submit to “psychiatric evaluations,” claiming that the
victims are likely to hurt themselves or others. Psychiatrists, citing the
DSM, invariably label the auditory targets schizophrenic or paranoid-
schizophrenic. Some auditory targets are even committed to mental
institutions based on those evaluations.
Indeed, psychiatrists have a vested interest in condemning those who hear
voices as paranoid-schizophrenics, for psychiatrists can treat only natural
symptoms, not induced or remotely transmitted ones. Thus, to protect the
credibility of their profession, psychiatrists must necessarily disclaim the
possibility of actual transmitted voices, or synthetic telepathy.
An article in the January 1, 2018 issue of The Washington Post by
Nathaniel Morris called “This Secret Experiment Tricked Psychiatrists into
Diagnosing Sane People as Having Schizophrenia” drove home the point
that psychiatrists cannot accurately diagnose schizophrenia. Morris related
an experiment conducted by Dr. David Rosenhan of Stanford University
several decades ago, which sent eight perfectly sane people to different
hospitals claiming that they heard voices.
One of the participants was a psychiatrist and three, psychologists. All eight
“patients” were admitted to the respective hospitals’ psychiatric wards
where they said that they no longer heard the voices. Despite that, they
remained from seven to fifty-two days. While there, they were given a total
12
of 2,000 pills, among them antipsychotics and antidepressants, most of
which they secretly discarded. Even the nurses who attended the patients
often noted actions on the part of the patients that suggested that they
were mentally ill.
When the experiment was revealed, Morris writes that the experiment
became a “disaster” and an “albatross” for the psychiatric community. Dr.
Rosenhan stated that the experiment proved that “. . . we cannot
distinguish the sane from the insane . . . .”
The Targets
Victims of remote voice transmissions cover the entire spectra of the
population. They include both genders and all ages. They also include all
races, ethnicities, levels of education, professions/occupations, religions,
philosophies, states of health, political leanings, economic statuses, social
strata, and life styles. Many of the victims are veterans.
Auditory targets range from the very young to the very old, the minimally-
educated to the MDs and PhDs, from the atheistic or agnostic to the piously
religious, from the public assistance recipient to the well off, from the
apolitical to the political activists, and from single people of various life
styles to the family-focused patriarchs and matriarchs. The only known
commonality that links the victims is that they all receive the voices.
The victims state that they hear the voices and other V2K-related sounds
wherever they go whether they are in airplanes at high elevations, in hotels
and other places outside their domiciles, in heavily wooded areas, in
underground facilities, and wherever else they go, even abroad. Thus, we
know that the remote voice-transmitting devices must have the capability of
going through walls and other structures and being beamed over vast
distances.
V2K doubters point to the presence of the voices heard everywhere as
proof that the auditory targets are truly mentally ill. However, the remote-
driven V2K was publicly demonstrated in 1973, forty-five years ago, and it
is virtually certain that in the meantime far more sophisticated but classified
methods have been developed to propagate the voices.
In previous studies of the voices, the earliest remote auditory targets state
that they began hearing the voices in the very early 1980s. Some targets
hear the voices only sporadically while others receive incessant voices both
day and night. Auditory targets are found in every industrialized nation and
13
in many developing countries. This study focuses only on Americans,
Canadians, and one participant from the UK.
Until recently, targets in general, including the auditory targets, have been
treated with doubt and disdain by the media, law enforcement, and the
public, who consider their claims incredulous. However, in the late summer
of 2017, attacks on US diplomatic personnel in Havana, first called “sonic”
in the media reports, focused international attention on some of the
symptoms that targets receive, for example, tinnitus, loss of hearing, visual
and balance problems, and vibrations, all oft-mentioned effects of targeting.
Later, diplomats in Uzbekistan and China also complained of similar
effects.
More recent reporting on the symptoms of the diplomats hints that some of
the victims may have also heard voices. A New York Times article entitled
“Update—NYT: Microwave Weapons Are Prime Suspect in Ills of U. S.
Embassy Workers,” dated September 1, 2018, states that the method used
on the diplomats could transmit “loud booms” and “words.” If indeed the
diplomats heard voices, US Government entities and the American media
have seemingly downplayed that information for some reason.
The Remote Voices
Although we do not yet know for certain, the various patents concerning
remote voice projection suggest that the attackers do not use one single
device on their targets but probably several different devices all controlled
by a single computer. One or more devices will probably administer the
physical effects on targets, and another device or devices will deliver the
neurological, or psychological effects.
We still do not know how contact is first made with the targets and how that
contact can be fixed upon the targets permanently. Nor do we know for
certain the methods of delivery of both the physical and the neurological
effects.
The voices are a key element in neurological, or psychological attacks on
targets that lend toward mind control. Without the voices, the attackers can
only harass the targets physically. If the aim of the attackers is only to
make the lives of the targets uncomfortable and painful, the physical
attacks achieve that purpose.
14
However, if the attackers seek to take over the lives of their targets, they
must also take over the minds of those targets, thus the neurological
element of the attack plan. Without the voices both to the targets’
ears/heads (audible) and to the targets’ subconscious (inaudible), mind
control would be impossible.
Proof of Remote-Delivered Voices
The United States, among other industrialized nations, has shown a keen
interest in neurological warfare, including the projection of sounds and
voices, since the 1940s. In the 1940s, persons standing near radar
antennas reported hearing voices. Their experiences were met with
skepticism, and others questioned whether those hearers might have
mental problems.
Perhaps because of the skepticism, it was not until 1961 that Allan H. Frey
described the possibility of producing voices by remote in an article called
“Human Auditory System Response to Modulated Electromagnetic Energy”
published in the Journal of Applied Physiology.
15
J. A. Elder and C. K. Chou of Motorola Florida Research Laboratories in a
2003 report entitled “Auditory Response to Pulsed Radiofrequency Energy”
described the hearing process: “RF [radio frequency] induced sounds
involve the perception via bone conduction of thermally generated sound
transients, that is, audible sounds are produced by rapid thermal expansion
resulting from a calculated temperature rise of only 5 x 10 -6 degrees C
[centigrade] in tissue at the threshold level due to absorption of the energy
in the RF pulse.”
Elder and Chou further reported that the temporal lobe of the brain
detected the RF sounds and by placing a sheet of metal over that area, the
sounds could not be heard. Nevertheless, many auditory targets have tried
shielding against the V2K with metal, and they have been unsuccessful.
Thus, in the meantime, scientists have probably invented a method to
circumvent metal shielding objects. In a 1967 article in the New York State
Journal of Medicine called “Sensation of Hearing in Electromagnetic Fields,
C. E. Ingalls stated that the effective radiofrequency was in the 10,000
megahertz range.
In the last decade and a half, scientists have doubtlessly made great
improvements to the devices/methods used to communicate remotely with
subjects. Although the reality of remote voices to people’s heads can no
longer be seriously debated, we still do not know for certain the devices or
methods currently used to transmit the voices from the sender to the
receiver. Just as in the last fifteen or so years the development of methods
16
for using DNA has been greatly improved, we believe that likewise the
development of voice transmission devices and methods has made giant
leaps.
Voice Transmissions
One method of transmitting the voices by remote is called “silent sound,”
described in Dr. Oliver Lowery’s Patent Number 5,159,703. Silent sound, or
the present-day subliminal sound, is often conducted over public address
systems, and is inaudible to the ears but subconsciously perceptible. That
method has been adequately demonstrated over the years.
The patent states that by using supercomputers, attackers can “analyze
human emotional EEG patterns and replicate them, then store these
"emotion signature clusters" on another computer and, at either real-time
or at will, ‘silently induce and change the emotional state in a human
being’.” In other words, silent sound can be used for mind control.
Many targets believe that the attackers use hypnosis to entrain the auditory
target’s subconscious to comprehend—but not hear--the content of those
inaudible voices. Indeed, hypnosis is often used. In 1974, researcher J. F.
17
Schapitz corroborated that belief when he stated, "In this investigation [,] it
will be shown that the spoken word of hypnotist may also be conveyed by
modulated electromagnetic energy directly into the subconscious parts of
the human brain - i. e. without employing any technical devices for
receiving or transcoding the messages and without the person exposed to
such influence having a chance to control the information input
consciously." In other words, the victim is entirely helpless to reject those
thoughts conveyed to his subconscious.
Why the particular victims are selected for targeting and for V2K assault is,
naturally, always in the minds of victims. What criteria do the attackers use
in choosing the victims? Let us examine the tabulations of the background
questions for possible answers.
None of the participants is very politically active, which means that the
motive for their targeting would probably not have been for political
purposes. Likewise, none of them had served in the armed forces, although
four had worked with the government on some level, so the Department of
Defense would probably have had little motive to target them unless the
targeting is for experimental reasons.
18
people authorities would have a particular interest in targeting only those
with former drug problems. Nevertheless, medical and social research
institutions may want to use the victims as research subjects for various
types of experimentation.
In regard to the drugs and alcohol, some targets are convinced that law
enforcement is behind their targeting. While it may be true that the police
might harass an individual, the police in most cases would not have the
sophisticated devices/methods to use in remote targeting. In addition, the
cost would be prohibitive on most law enforcement budgets.
Even if law enforcement should target someone, they would have no need
to employ psychological trickery and the voices on the victims. Moreover,
the cost of maintaining constant surveillance and bombarding the victims
with physical and neurological effects would be enormous. Thus, we can
probably eliminate law enforcement as an entity as being the remote
attackers. However, could some law enforcement officers be involved in the
targeting? Surely, they could.
Interestingly, ten participants had had some kind of surgery, most of them
before they discovered that they were targeted. There are known cases of
microchip implantation without the knowledge and consent of the targeted
victims performed by surgeons and others. It would be an easy matter to
insert microchips during surgical procedures so that the patient could be
used as a research subject by medical institutions and research labs.
Financially, all of one of the participants earn under $20,000 a year. Ten
are either on medical disability or unemployed. Two are retired. Only one is
gainfully employed, and that person is the only one who earns more than
$20,000 a year. Therefore, there seems to be little financial motive for their
targeting.
Spiritually, ten participants practice some type religion or hold some type of
religious-type philosophies. Three are agnostic. Cases of targeting because
of religious beliefs, however, seem to be very rare.
Only one participant has a college degree. That, of course, has nothing to
do with the intelligence quotient of the participants. The education level
would probably not figure in the selection of most of the participants as
targets unless it were of an experimental nature.
19
Thus, it appears that the most plausible reasons for targeting the
participants in this study are for (1) experimentation and for (2) punishment
for something that the participant said or wrote. None of the participants
appears to be an activist or a whistleblower, which tends to point to
experimentation as the greatest possibility for their targeting.
Participant Tabulation
20
15. Four are unemployed; machinist; land scaping; customer service; the
arts; registered nurse; SsDi (?); mechanic; machinist; and office
administration.
16. Six on medical disability; four unemployed, two retired; one
employed.
17. Nobody had served in the Armed Forces.
18. Four had worked for the government on some level.
19. Ten had reported their targeting to authorities; three had not.
20. Ten had undergone some type of surgery, most of them before they
discovered their targeting; Three had not had surgery.
21. Four did not know their blood type, 4 type A, 1 type AB, 3 type O, one
did not answer.
22. Nobody speaks a different language fluently, one speaks “medium
French.”
23. Seven do not live alone; five live alone; one lives alone with a small
child.
24. Only one states that perhaps his/her children can hear the voices;
one has a sibling diagnosed as schizophrenic.
25. Six live in houses, six live in condos, apartments, or townhouses, one
lives in duplex.
26. Six had travelled abroad; five had not travelled abroad; two did not
answer the question.
About the Study
This study was conducted largely to determine what tactics the attackers
use in their V2K attacks, and particularly, presuming that there are many
groups of attackers, the similarities in those tactics. Thirteen participants
compared what their attackers say and how they say it as well as the
physical and neurological effects that those attackers use along with the
V2K.
There are a number of ways to present our findings. We have used the
following method: we list below the similarities in the physical and
21
psychological attacks, beginning with those on which all thirteen
participants agree, then twelve, eleven, and finally ten. Those similarities
shared by nine and below are treated in a following section.
Under each number of participants, the similarities are listed under two
headings: Physical and Psychological. The reader will notice that some
similarities can be interpreted to include both physical and psychological
characteristics. Similarities noted by nine participants and fewer are not
listed under Physical and Psychological. Here are the tactics used by the
V2K attackers.
A discussion of those similarities follows each number of participants who
experience them. Those similarities are seen in the questions and
tabulations of the questions found in the study’s Appendix.
SIMILARITIES IN PARTICIPANTS’ V2K TACTICS
Thirteen Participants
Physical Similarities
Causing ceaseless tinnitus, or “ringing in the ears.”
Promoting digestive problems.
Causing victims’ hearts to race abnormally.
Psychological Similarities
Inducing anxiety.
22
Causing victims to feel that they are unattractive.
Discussion
23
You will notice that one psychological similarity shared by all thirteen
participants is anxiety. Actually, all of the remainder of the psychological
similarities listed, particularly sleep deprivation, aid in inducing anxiety.
Twelve Participants
Physical Similarities
Introducing unfamiliar smells and odors that are not characteristic of their
victims’ ambience.
Psychological Similarities
Sowing lewd and negative stories about friends and loved ones.
24
Blanking out thoughts in victims’ minds.
Leading victims to believe that food and drink have been tampered with.
Discussion
The twelve participants represent 92% of the entire group. If this group is
representative of the targeted voice hearers, it appears that the greatest
number of both physical and psychological similarities occur in that
percentage of the targeted group. In other words, all of the highest 8% of
targets get certain tactics in common, and the lowest 8-10% get some
unusual tactics; however, the upper level of the middle range gets the most
physical and psychological tactics used by the attackers.
ELEVEN PARTICIPANTS
25
Physical Similarities
Psychological Similarities
Whispering in the V2K so that voice hearers have to listen more closely to
what is being said.
Talking about particular persons whom the victims know and programming
victim’s thoughts about those persons.
Leading victims to believe that the attackers can see out of the victims’ own
eyes.
Discussion
You will notice that most of the participants experience some type of
manipulation of their genitals. Sex plays an important role in targeting. The
capability of the attackers to manipulate participants’ sexual organs causes
shame and guilt in the minds of participants. Helpless against that invasion
of privacy, targets become frustrated by the lack of control over their sexual
being. Once again, that leads to anxiety.
26
Most people respect authority figures. It is little wonder then that the
attackers often pretend to be law enforcement and investigators. That
intimidates the targets and psychologically probably aids in the attackers’
capability of extracting information from targets. Threatening targets with
jail is a psychological ploy to frighten targets, most or all of whom have
never committed any significant crime.
Whether or not the attackers can see what targets are doing by actually
seeing through the targets’ eyes remains to be proven. Targets know that
their attackers do indeed know what they are doing at any given time; yet, it
may be that the attackers have a panoramic view of targets’ activities rather
than seeing those activities through targets’ eyes. Also, as the brain
controls all activities, the brain may be conveying those activities to the
attackers via the attackers’ method of reading minds.
One can see that the psychological similarities far outweigh the physical
ones. The largest part of the V2K assault is based on psychology. Assault
on the mind is far more effective than assault on the body. The physical
effects only serve to heighten the effects of the psychological assault.
TEN PARTICIPANTS
Physical Similarities
Psychological Similarities
27
Threatening to send targets to the emergency room or the hospital.
Informing victims that certain friends and family members are also targeted.
Trying to convince victims that friends and family members are plotting
against them.
Discussion
That the attackers are able to monitor targets’ bodily functions should come
as no surprise. Their devices register changes in such functions as blood
pressure. For example, when a door suddenly slams and startles the
victim, the change in blood pressure shows on their devices.
28
A feature that is almost always a part of V2K assault is the attackers’
interrogations. The attackers already know much about the targets
whenever they begin their assault. The interrogations augment their
information not only about the targets but also about people whom the
targets know.
It is evident from the tabulations that targets in this group, or 77% of the
entire group, receive the greatest number of psychological effects from the
attackers.
[The following similarities are those that from nine to four participants
have experienced. They are not categorized under Physical and
Psychological.]
NINE PARTICIPANTS
Hear the voices continually day and night, as opposed to four who hear the
voices only at certain times.
Their attackers praise them for something they think, say, or do.
Hear voices in public talking about them but do not actually see the talkers.
Have problems with constipation.
Their attackers tell them that they are crazy about someone or that
somebody wants them.
Have heard voices in their V2K that they thought that they were not
supposed to hear.
The attackers lead them to think that they are having a heart attack or
stroke.
29
Believe that their attackers have a panoramic view of them and see
everything that they do.
EIGHT PARTICIPANTS
Their attackers ask them questions about their relationship with a particular
person or group.
Their attackers have told them that they (the attackers) were responsible
for them or were assigned to them.
Have an unnatural craving for food although they are not actually hungry.
Feel touches on the face that make the spots seem numb or that tickle in
that particular spot.
Hear the voices coming from other objects, usually objects that have some
type of motor.
Their attackers state a number and have the victims think of anything
related to that number.
Told to apologize for something that they have done but not told what that
was.
30
Led by the attackers to believe that a friend, neighbor, or relative was
responsible for a missing item.
Have been disoriented by their attackers while driving and have made
wrong turns, etc.
SEVEN PARTICIPANTS
Their attackers tell them that they knew them (the victims) in the past.
Encouraged by their attackers to eat and drink in excess and to eat the
wrong kinds of food.
Led by their attackers to believe that someone else was in the room with
them in the darkness.
Feel an intense itching on the scalp that forces them to claw their scalp.
Have heard hints from the attackers about the locations of the attackers.
Have been told that a friend or loved one has been unfaithful and was
having an outside affair.
SIX PARTICIPANTS
31
Heard only male voices at the beginning of their V2K.
Did not experience any physical effects BEFORE their V2K began.
Their V2K attackers tell them that they are going to hell.
FIVE PARTICIPANTS
Told that their attackers were going to burn down their domiciles.
FOUR PARTICIPANTS
One of the voices that they hear sounds much like their own voices.
They were not bothered by stalking before the electronic attacks began.
Have been told that a friend or a family member was having a nervous
breakdown.
The attackers had tried to convince them that they had a duel personality.
32
Three have been led to believe that they could frighten or harm their
attackers by using their minds.
Only two have had psoriasis.
Only two have heard obvious recordings of harangues by professional
speakers and “preachers.”
Two have been told by their V2K attackers that someone in the family was
sexually abusing somebody.
Only one had been told that he/she was sexually attracted to someone no
longer living.
Discussion
The physical and psychological effects that the remainder of the
participants receive demonstrate the versatility of the V2K plan of attack.
The attackers have at their command an impressive bag of tricks that allow
them many options for individualizing, or tailoring the attacks, for particular
targets.
SUMMARY AND CONCLUSIONS
Answers to the more than two hundred questions in this study provide us
some insight into targeting and especially the voices. They show that
although the participants are far flung geographically, the modus operandi
of their V2K attackers does indeed share many similarities.
What this tells us is that originally a type of user manual was probably first
used in teaching attackers to use the torture plan. It also suggests that at
first there was only one group that had access to the plan. However, over
the years the devices/methods have either been purposely lent to other
groups or have been purloined by other groups. As various other persons
and/or groups acquired the devices/methods used for electronic attacks,
they kept some of the more general tactics and also improvised and
customized other specific tactics to suit their own individual purposes and
agendas.
Today, there seemingly are many groups, each one with its own particular
purpose but each one basically using the same overall V2K attack plan to
achieve that purpose. The stark contrast between some participants’ V2K
assault from other participants’ assault tends to confirm the existence of
33
multiple groups of attackers and the diversity of effects of the attack
system.
In this study, the participant who started hearing the voices the earliest
gives the date as 1995. The remaining twelve participants began hearing
the voices in the 2000s. Seven of the latter started getting the voices from
2007 onward. Thus, our information suggests that the number of auditory
targets is steadily increasing.
No voice-hearing participant receives only the voices. All of them also
receive various other physical and other neurological effects. In fact, I do
not recall ever corresponding with a voice hearer who did not also get other
physical and neurological symptoms. The two go together.
Deception reigns in the implementation of the plan of V2K attack. The
attackers attempt to mislead targets in believing who is behind the
attackers. They very often try to convince the victims that their attackers
are law enforcement or investigators. And they lead victims to think that
they are all-powerful and that the victims are helpless.
It is very clear that the plan of attack via V2K is based mainly on
psychological effects rather than physical ones. The physical effects only
reinforce the psychological assault. Total control of the victims appears to
be the ultimate objective. That control can only be achieved by tampering
with the brain for the brain determines the victims’ thoughts and actions.
To control the victims, it appears that the attackers must render them
helpless. Ewen Cameron, a Canadian psychiatrist who worked with the
American CIA in the 1950s, developed what he called “psychic driving.”
That program attempted to break down a victim through physical
discomfort, sleep deprivation, forced listening to recorded materials, the
misuse of sound, and other means.
In their V2K assault, the attackers attempt to adversely affect the lives of
the victims in any possible manner. Threats against the loved ones, friends,
and property of the victims, the use of sex or sexual themes in their attacks,
34
affecting the capability of victims to earn a living, playing upon guilt and
remorse, and other forms of attack make the lives of victims almost
unbearable.
35
result of some traumatic negative action like a divorce, a house foreclosure,
the loss of a job, or the death of a loved one. They play up that loss with
the hidden voices, causing the victim extreme anxiety. The effects make
the victim appear paranoid schizophrenic.
As a result of the anxiety, the target often goes over the edge into full
panic, which drives a victim to a psychiatrist, sometimes gets him
committed to a psychiatric clinic, or causes him to take some other drastic
action such as rampage shootings or suicide. In the least, a visit to a
psychiatrist destroys a target’s credibility.
Additional Research Required
In conducting scientific research, one must ask and answer the cardinal
questions of who, what, when, where, why, how, and how much. This study
focuses principally on the “what” and the “how.”
We now know many, perhaps most of the tactics used by the attackers in
the application of the V2K. However, to be effective in using the V2K, the
attackers must also employ physical and neurological effects. The V2K
alone would not accomplish the attackers’ objectives.
Additional, more technical research is required to determine “who” is
responsible for targeting and the V2K and “how” the targeting and V2K is
carried out. The least important of those questions in the case of V2K
appear to be the “why,” the “where,” and the “when.”
What Every Voice-Hearer Should Know
Answers to the more than two hundred questions in the study serve as both
a warning and a guide to targets who receive the V2K assault. What have
voice hearers learned over the years about V2K?
Underneath the plainly heard V2K, the attackers use a far more dangerous
form of V2K that is not readily heard, sometimes called the “silent” V2K,
that instead goes to the victim’s sub-conscious. Every victim who receives
the audible voices also receives the inaudible ones. The damage that the
silent V2K causes is incalculable.
The attackers’ V2K assault is based on the simplest use of psychology.
Whereas psychiatrists and psychologists supposedly use their knowledge
for positive purposes, the V2K attackers use psychology for totally negative
ones. Along with the audible V2K, the attackers relentlessly ply the victim
36
with the unheard, silent voices to tear down his self-esteem and self-
confidence, fill him with guilt and remorse, to turn him against his family
members and friends, to damage his appearance and health, to fill him with
suspicion of neighbors and every element of the government and society,
to make him feel useless, and to cause him to think, say, and do things that
get him psychologically evaluated and sometimes sent to the psyche ward,
to commit acts that get him jailed or imprisoned, or to goad him into
committing suicide.
The voices and especially the silent voices represent the cruelest form of
touchless torture. They ruin lives. They destroy families. They wreak havoc
in society. They fill prison and psyche cells. They make victims’ lives
unbearable. The voices are the judge, jury, and executioner of victims who
are deemed guilty without due process.
Voice hearers are often deluded by their attackers, who use deception in a
most masterful form. Victims must understand that their attackers are
actually the epitome of cowardliness who hide behind distance. They
seemingly derive pleasure from the torture and the result of that torture.
The attackers are inhuman creatures whose mere existence blights the
earth. They are the basest of all evil. V2k receivers must learn not to heed
anything that the attackers tell him.
Until a victim understands the vileness of his attackers and that almost
every word of the attackers is based on deception, he will fall prey to the
attackers’ psychological assault. Indeed, many targets do. Regardless of
why victims are selected for targeting and V2K reception, the attackers are
callous and cruel criminals whose torture should be condemnable in every
corner of the earth.
APPENDIX
Tabulations of Questions Asked in the Study
Set 1 Tabulations
001. When did you first start hearing the V2K? (Year)
1995, 2000, (2) 2006, 2007, (2) 2008, 2013, 2015, 20017; (2) 2016, 2018,
(One says that the V2K stopped for about 6 years and then started back.)
002. In what location did you first hear the voices? (Country and city)
37
BC, Canada; Toronto, Canada; Calgary, Canada; (3) Florida; Illinois, Idaho,
(2) Massachusetts; California; New Jersey; Texas.
003. Where were you when you first heard the V2K? (House, car, airplane,
etc.)
004. How would you describe those first voices? (Threatening, insulting,
frightening, etc)
Various answers, but all indicated that the voices were intrusive. One
stated that the voices were not at first threatening but later became
negative.
Eight heard more than two voices; five heard only one voice.
Six initially heard male voices; seven heard a mix of voices. Nobody heard
only a female voice.
007. Did the voices have a particular accent? (If so, please explain.)
Only one heard voices that did not all sound American. One said that a
woman was British. One said that the voices were Southern at first. One
said that they spoke with a lisp. One said that at first they sounded
Southern and then changed to English as spoken by a Korean.
008. Do the attackers now use the same voices every day?
Six said that they still hear the same voices; five said no; one was unsure;
one answer was not clear.
009. Are the voices you hear today the same ones that you first heard?
38
Six said that the voices they hear are those that they first heard; six said
no; one said he/she was unsure.
010. Do you receive the voices (a) only occasionally, (b) intermittently
during the day and night, (c) only in the daytime, (d) only in the nighttime,
or (e) continually?
Nine hear the voices continually. Four hear them at various times.
011. Have the attackers’ voices ever sounded like they came from your
stomach?
012. Have you awoken at night while the V2K attackers were asking you
questions?
013. If so, what is the nature of the interrogation? (people, places, events,
etc.)
Various answers.
Only one said that the attackers do not threaten to vandalize or take
possessions.
015. Do you also receive holographic images along with your V2K?
Twelve said that they receive holographic images or have at one time
received them.
016. If so, what type of images do you see? (people, places, objects, etc.)
Various answers.
39
017. Do the attackers tell you ugly and negative things about your friends
and relatives?
Twelve said that they talk about friends and relatives or have talked about
them at some time.
018. If so, what kind of things do they tell you about them?
Various answers.
019. Do you wake at night to dreams that you know are induced?
Ten said that they get induced dreams; two said that it’s possible that they
do; one answer is unclear.
020. Do the attackers sometimes praise you for something that you do or
think?
Nine said that their attackers sometimes praise them for something.
Set 2 Tabulations
021. Do the attackers pretend that they knew your family years ago?
Eleven said yes at one point or another; only two said no.
023. Do the voices sound louder/clearer in one ear than the other? (If so,
which ear?)
Only five said the they were no louder/clearer in one ear than the
other; three said they were louder on the right side; three said that
they were louder on the left side; two answers were no clear.
024. Do the V2K talkers sometimes cause a clicking sound in one or both
ears?
40
Seven heard clicking in one ear or the other at some point; only five
got no clicking at all; one was unsure;
025. If you receive more than one voice, are they all the same volume and
seem to come from the same place? [For example, do you sometimes hear
a woman’s high-pitched voice screaming in the background, seemingly
from a distance?]
026. Does one of the voices sound similar to your own voice?
Only four stated that one of the voices sounded like their own voices.
027. Do the attackers stage scenarios or create skits and make you the
principal actor during your sleep?
Ten said that they do; two were unsure; one answer was not clear.
028. Do your attackers often whisper and talk in a very low volume that
allows you to hear only snatches of what they say?
Eleven said that they do; only one said no; one person did not answer
the question.
029. Do your attackers ever direct your thoughts to certain people, places,
or objects and then question you about them?
All thirteen said that they are sleep deprived to some extent.
031. Have the attackers ever spoken to you in other languages? If so, what
language?
41
Three said that their attackers had used another language; one said
that they caused him/her to speak in Russian.
032. If so, does that language have any particular significance in your life?
One of the three said that the language was that of his/her parents;
one said that it was a language that he/she took in high school and
college.
033. Do the attackers ever ask you about your ‘relationship” with a
particular individual or group?
034. Have you experienced a ringing in the ears (tinnitus) ever since you
first heard the voices?
035. Do the voices ever seem to come from the shower head or the
spewing water when you shower?
036. Do your attackers especially bother you the night before an important
event? (a job interview, departure for a trip, etc.)
037. Do you sometimes wake at night with the attackers showing you
photos of people, places, or objects and interrogating you about them?
Only four said no; one said that they did extort/steal money from a
relative.
039. Do they ever talk about places where you’ve lived or visited?
42
Only three said that their attackers did not mention other places.
040. Have they ever told or suggested to you why you were selected for
targeting?
Only one stated definitely no; others have gotten hints about the
reason.
Set 3 Tabulations
041. Do the attackers pretend that they knew your family years ago?
Eleven said yes at one point or another; only two said no.
043. Do the voices sound louder/clearer in one ear than the other? (If so,
which ear?)
Only five said the they were no louder/clearer in one ear than the
other; three said they were louder on the right side; three said that
they were louder on the left side; two answers were no clear.
044. Do the V2K talkers sometimes cause a clicking sound in one or both
ears?
Seven heard clicking in one ear or the other at some point; only five
got no clicking at all; one was unsure;
045. If you receive more than one voice, are they all the same volume and
seem to come from the same place? [For example, do you sometimes hear
a woman’s high-pitched voice screaming in the background, seemingly
from a distance?]
43
046. Does one of the voices sound similar to your own voice?
Only four stated that one of the voices sounded like their own voices.
047. Do the attackers stage scenarios or create skits and make you the
principal actor during your sleep?
Ten said that they do; two were unsure; one answer was not clear.
048. Do your attackers often whisper and talk in a very low volume that
allows you to hear only snatches of what they say?
Eleven said that they do; only one said no; one person did not answer
the question.
049. Do your attackers ever direct your thoughts to certain people, places,
or objects and then question you about them?
All thirteen said that they are sleep deprived to some extent.
051. Have the attackers ever spoken to you in other languages? If so, what
language?
Three said that their attackers had used another language; one said
that they caused him/her to speak in Russian.
052. If so, does that language have any particular significance in your life?
One of the three said that the language was that of his/her parents;
one said that it was a language that he/she took in high school and
college.
053. Do the attackers ever ask you about your ‘relationship” with a
particular individual or group?
44
Eight stated that they do.
054. Have you experienced a ringing in the ears (tinnitus) ever since you
first heard the voices?
055. Do the voices ever seem to come from the shower head or the
spewing water when you shower?
056. Do your attackers especially bother you the night before an important
event? (a job interview, departure for a trip, etc.)
057. Do you sometimes wake at night with the attackers showing you
photos of people, places, or objects and interrogating you about them?
Only four said no; one said that they did extort/steal money from a
relative.
059. Do they ever talk about places where you’ve lived or visited?
Only three said that their attackers did not mention other places.
060. Have they ever told or suggested to you why you were selected for
targeting?
Only one stated definitely no; others have gotten hints about the
reason.
Set 4 Tabulations
45
Only two said that the V2K attackers do NOT threaten to kill or harm
other family members.
062. Do the attackers tell you or have they told you that they’re going to
bankrupt you?
Ten said that they DO state that they’re going to leave them penniless.
063. Do the V2K attackers appear to be programming you to carry out a
particular objective or agenda (or to prevent you from doing so)?
All thirteen state that they believe the attackers are programming
them to do or not to do something.
064. Do you feel that the V2K attackers sometimes blank out your
thoughts?
Only one participant said that he/she did NOT believe that the
attackers could blank out his/her thoughts.
065. Have the attackers ever told you something or made you believe
something through their V2K that sent you on “wild goose chases” (perhaps
looking for bugs hidden in your house or locating a particular “perp” site)?
All thirteen participants stated that they had been sent on “wild goose
chases” by the attackers, although one participant said that it “rarely”
happened.
066. Have the attackers ever suggested or tried to make you believe that
you and some other person whom you know are actually one and the same
individual (dual personalities)?
Only four said that the attackers had tried to convince them that they
had a dual personality. [That tactic was a feature of MKUltra.]
067. Have the attackers ever said anything that suggested that they were
sorry for attacking you, suggesting perhaps that they were forced to attack
you?
Five participants said that the attackers had at some point
“apologized” for attacking them. One answer was not clear.
46
068. Have the attackers ever suggested a sexual intimacy between you
and them or made innuendos about going to have sexual relations with
you?
Only two stated that the attackers had NOT ever suggested a sexual
intimacy between them and the attackers.
069. Do you sometimes awake from the V2K sexually aroused (having
orgasm or an erection)?
Only one participant said that he/she had NOT awoken sexually
aroused. One answer was not clear.
070. Have you ever heard what seemed like actual voices talking about you
while in public but you could not see the speakers or the speakers’
mouths? (Perhaps their backs were toward you or you could see nobody at
all.)
Nine participants said that they had heard voices in public talking
about them but had not actually seen anybody talking.
071. Did you experience any physical effects before you started hearing the
voices?
Six did NOT experience physical effects before they began hearing
the V2K. Two could not remember any specific effects.
072. Did you experience any stalking before hearing the voices?
Four stated that they were NOT bothered by stalking before hearing
the voices. One was unsure.
073. Did the voices begin shortly after you broke up with a companion or
had intimate relations with a person?
Only four began hearing the voices after intimacy with a partner. One
answer was unclear.
074. Do the voices ever say anything about knowing you at an earlier age?
E.g., “We went to elementary school with you.” Or, "We went to high school
with you.”
47
Seven said that the attackers had suggested that they had known
them in the past.
075. Do the V2K attackers talk about events in your infancy and childhood
and try to make you feel guilt, remorse, anxiety, etc. about them?
Only one said that the attackers had NOT brought up instances in
his/her childhood and made to feel remorseful about them.
076. Do you feel like you have to clarify and articulate carefully your
thoughts and even explain them to the V2K attackers?
Eight stated that either now or in the past they felt compelled to
clarify their thoughts to the attackers. One answer was not clear.
Six said that they DO involuntarily see the faces of people whose
names are mentioned by the attackers. Two answers were unclear.
078. Do the attackers sometimes state a particular first name and you think
of all of the people whom you know by that name?
Eleven stated that they DO think or have thought of all the people by
the same name that the attackers mention.
Only four said that their attackers do NOT give them any idea about
their religious beliefs.
48
081. Do you sometimes get cramps on some part of your body, particularly
while in bed at night?
Only one said that he/she does NOT get cramps sometimes on parts
of the body. One did not answer that question.
Set 5 Tabulations
082. Do the attackers tell you that you are going to hell?
Seven participants state that the attackers do NOT tell them that
they’re going to hell. Six say that they DO.
083. Do the attackers sometimes tell you that you’re going to jail or prison?
Only six say that they DO use particular code names for them.
085. Have the attackers told you or suggested to you who they are? If so,
who?
Only two state that their attackers have given them NO clues about
their identify. Quite naturally, the talkers will practice deception
concerning their identity.
Only three say that the attackers do NOT substitute words in their
hearing. One answer was unclear.
49
087. Have the attackers ever projected their voices to you that seem to
come from the TV or a radio? (For example, the TV newscaster is talking
about you.)
Only three state that their attackers had NOT ever sent their voices
through the TV or the radio.
088. Do the attackers sometimes make you forget where you put objects
and then belittle you for not remembering where you put them? (car keys,
cell phone, medicines, toilet items, etc.)
Ten say that their attackers DO make them forget where they put
objects.
089. Do the voices sometimes tell you that they are “responsible” for you,
suggesting that they’ve been assigned to monitor you?
Eight state that the voices DO suggest or have suggested that they
have been assigned to them. Five say they have NOT,
090. Do the attackers attempt to take credit for negative things that happen
in your life?
Only one says that the attackers do NOT take credit for negative
happenings.
091. Do the attackers ever express anger and frustration, perhaps over
something that you say or do?
092. Do the attackers talk negatively about particular racial, ethnic, political,
social, or religious groups?
Only three say that the attackers do NOT talk about particular groups.
093. Do the attackers ever tell you that you’re “hardheaded” or stubborn?
50
Eight state that the attackers DO tell them or have told them that they
are stubborn.
094. Have the voices ever tried to convince you that you are crazy?
All thirteen say that at one time or another the attackers DO or have
tried to convince them that they are crazy.
095. Do you feel that your V2K attackers use Artificial Intelligence in their
talking? (A tale-tell sign of the use of AI is occasionally heard in the rapid
repetition of phrases and sentences several times in a row in the same
voice and manner.)
Only two feel that the attackers do NOT use AI in the voices heard.
096. Do the attackers use obvious recorded material along with their real
time talking? (If you hear the same statements in the same voice and
stated exactly the same way each time, it may be previously recorded.)
Only two believe that their attackers do NOT use previously recorded
material in the voices. One did not answer the question.
097. As the voices talk, do the attackers sometimes manipulate your sexual
organs?
Eleven state that the talkers DO manipulate their genitals. Only one
says that the talkers do NOT play with their sexual organs. One
states, “not usually.”
098. Do the attackers ever suggest that you are not patriotic?
Eight state that the attackers do NOT question their patriotism. Five
say that the talkers DO tell them that they are not patriotic.
099. Can you hear the voices when you are conversing with others,
watching TV, working, or are otherwise distracted?
Eleven hear the attackers’ voices even when they are engaged in
other talk or listening to TV/radio. One says “no.” Another one says,
“Not as clearly.”
51
100. Do the attackers talk about a particular person whom you know or
particular people whom you know over and over day after day?
101. Do the attackers try to convince you that you have committed a
particular crime or a sin?
102. Are there indications that the attackers can read your
mind/thoughts?
Set 6 Tabulations
103. Have you ever experienced anxiety or been treated for anxiety?
All thirteen participants have experienced anxiety that they feel is related to
their targeting.
104. Do you have psoriasis or have you ever been treated for psoriasis?
All thirteen state that the V2K attackers have tried to destroy a
relationship of some type with a friend or relative.
106. Do you talk back to or dialog or have you ever talked back to or
dialoged with your attackers through the V2K?
52
107. Do the attackers ever use the expression “(Name of a person) is crazy
about you?” Or “(Name of a person) wants you?”
Nine participants have been told that somebody is crazy about them or that
someone wants them.
108. Do the attackers ever suggest or tell you that you are sexually
attracted to a person who is no longer living?
Only one participant’s attackers try to make him/her believe that he/she is
sexually attracted to a person no longer living.
Ten participants state that their attackers try to or actually make them
look unattractive.
110. Do you feel an overpowering craving for food (although you are not
actually hungry)?
Eight feel a craving for food despite not actually being hungry.
111. Have the attackers ever told you that they were coming to harm you or
sending someone to harm you (E. g., that they are sending a “Death
Squad”)?
112. Have the attackers ever threatened to burn down your domicile?
Only five participants have been told that the attackers were going to burn
down their domicile.
113. Do the attackers try to convince you that certain family members are
plotting against you?
53
Ten have been told or led to believe that particular family members were
plotting against them.
114. Have the attackers ever led you to believe that you had supernatural
powers (E.g., having visions that give you the answers to targeting
questions)? [I was once led to believe that I could detect and locate
microchip implants in other targets.]
Nine participants have been led to believe that they had supernatural
powers.
115. Do the attackers ever suggest that if you do a certain action or think in
a certain way that they will cease their attacks?
Eight have received suggestions by the attackers that if they take certain
actions or change their views that their attacks would end.
116. Are there any indications that make you think that your attackers are
very well educated?
Only five believe that their attackers may be well educated. One states that
they seem to be “somewhat” educated.
120. Do the attackers often give you commands when they know that you
are going to do that action anyway (washing your hands, brushing your
teeth, closing the door, turning out the lights, etc.)?
Only three are NOT given commands to do what they would ordinarily do.
One states that they tell him/her what he/she is going to do after he/she
has decided to do it.
54
121. Have the attackers ever pretended that you could do them harm or
frighten them by using your mind? (E.g., sending bolts of lightning to strike
them or causing a roaring fire that consumes them.)
Only three have been led to believe that they could harm or frighten their
attackers by using their minds.
122. Do you receive or have you ever received electrical-like jolts to your
body?
Eight sometimes feel touches on the face that make the spot seem numb
or tickle. One answer was not clear.
Set 7 Tabulations
124. Do your attackers ever cause or have they ever caused your heart to
race abnormally?
125. Do your attackers ever repeat your words as you think them? (E. g.,
although I pray silently, my attackers often repeat my prayer as I pray.)
Twelve have their thoughts repeated by the V2K attackers. Only one does
not.
126. Do you ever think of a song or something that you heard and you
continually think about that afterward? [E. g., my attackers caused me to
think of the song “You’re Always on My Mind,” and I heard it in my mind for
days afterward.]
55
127. Do “glitches” that you know are not natural “glitches” occur on your
computer?
128. Do the attackers ever cause you to believe that a member of your
family is being sexually molested or is sexually molesting another person,
usually a child?
Only two have had the V2K speakers tell them that family members are
somehow involved in sexual molestation.
129. Do the attackers ever criticize something that you said to somebody
or thought about somebody and try to make you feel guilty over it?
Twelve are criticized and made to feel guilty by their V2K attackers about
what they say or think. Only one is not.
130. Do the attackers ever tell you that you are very smart/intelligent?
Ten are told or have been told that they are very smart or intelligent.
131. Do the attackers ever try to make you think that certain foods,
beverages, and medicines in your domicile have been tampered with?
Twelve participants have been led to believe that food and/or medicines in
their domicile have been tampered with. Only one has not.
132. Have the voices ever made you believe that there are listening
devices or cameras planted in your domicile?
Only one has NOT been led to believe that cameras and listening devices
are planted in the domicile. One said that although he/she was not told that,
he/she had found those devices hidden in the domicile.
133. Do the voices ever seem to come over air conditioning ducts, motors,
or other electrical objects?
56
Eight participants have heard the voices over various objects. Five have
not.
134. Do the attackers sometimes state a particular year and then continue
to talk and/or question you about that year?
Ten have NOT been told a specific year and questioned about it. Three
have been.
135. Have the attackers ever tried to convince you that you were having a
heart attack or a stroke?
Nine have been led to believe that they were having either a heart attack or
a stroke, Four have not.
136. Do your attackers ever make reference to time, like “four thousand
years ago, etc.” or “twelve years ago”?
Nine have NOT heard the V2K attackers state a number of years ago. Four
have.
137. Do your attackers ever say a number and then cause you to think
back when you or your children were that age or think of something else
relating to that number?
Eight have had the attackers state a particular number and have been led
to think about anything related to that number. Five have not.
138. Do the attackers suggest that they have also targeted a relative of
yours or a good friend?
Ten have been told or led to believe that a relative or a good friend was
also targeted. Three have not.
139. Have the attackers ever threatened to send you to the “hospital” or the
“emergency room?”
Ten have been threatened with being sent to the emergency room or to the
hospital. Three have not.
57
140. Do the attackers lead you to believe that others are making fun of
you?
Twelve are led to believe that others make fun of them. Only one is not.
141. Do the attackers try to convince you that you are ugly, that you’re fat,
that you smell bad, or are otherwise undesirable?
All thirteen hear or have heard from their attackers that they are ugly or
otherwise undesirable.
142. Do the attackers encourage you to eat the wrong kinds of food or
perhaps eat and drink too much?
143. Do you sometimes hear other voices that you think that you are not
supposed to hear underlying or superimposed over or in the background of
the usual V2K?
Nine have at some point heard voices that they thought that they were not
actually supposed to hear. Four have NOT.
144. Do the attackers refer to you as being gay, try to make you believe
that you are gay, or tell you that others believe that you are gay?
Ten have had their V2K attackers suggest or attempt to convince them that
they were gay and/or that others thought that they were gay. Three have
NOT.
Set 8, Tabulations
145. Do your attackers ever cause or have they ever caused your heart to
race abnormally?
58
146. Do your attackers ever repeat your words as you think them? (E. g.,
although I pray silently, my attackers often repeat my prayer as I pray.)
Twelve have their thoughts repeated by the V2K attackers. Only one does
not.
147. Do you ever think of a song or something that you heard and you
continually think about that afterward? [E. g., my attackers caused me to
think of the song “You’re Always on My Mind,” and I heard it in my mind for
days afterward.]
148. Do “glitches” that you know are not natural “glitches” occur on your
computer?
149. Do the attackers ever cause you to believe that a member of your
family is being sexually molested or is sexually molesting another person,
usually a child?
Only two have had the V2K speakers tell them that family members are
somehow involved in sexual molestation.
150. Do the attackers ever criticize something that you said to somebody
or thought about somebody and try to make you feel guilty over it?
Twelve are criticized and made to feel guilty by their V2K attackers about
what they say or think. Only one is not.
151. Do the attackers ever tell you that you are very smart/intelligent?
Ten are told or have been told that they are very smart or intelligent.
152. Do the attackers ever try to make you think that certain foods,
beverages, and medicines in your domicile have been tampered with?
59
Twelve participants have been led to believe that food and/or medicines in
their domicile have been tampered with. Only one has not.
153. Have the voices ever made you believe that there are listening
devices or cameras planted in your domicile?
Only one has NOT been led to believe that cameras and listening devices
are planted in the domicile. One said that although he/she was not told that,
he/she had found those devices hidden in the domicile.
154. Do the voices ever seem to come over air conditioning ducts, motors,
or other electrical objects?
Eight participants have heard the voices over various objects. Five have
not.
155. Do the attackers sometimes state a particular year and then continue
to talk and/or question you about that year?
Ten have NOT been told a specific year and questioned about it. Three
have been.
156. Have the attackers ever tried to convince you that you were having a
heart attack or a stroke?
Nine have been led to believe that they were having either a heart attack or
a stroke, Four have not.
157. Do your attackers ever make reference to time, like “four thousand
years ago, etc.” or “twelve years ago”?
Nine have NOT heard the V2K attackers state a number of years ago. Four
have.
158. Do your attackers ever say a number and then cause you to think
back when you or your children were that age or think of something else
relating to that number?
Eight have had the attackers state a particular number and have been led
to think about anything related to that number. Five have not.
60
159. Do the attackers suggest that they have also targeted a relative of
yours or a good friend?
Ten have been told or led to believe that a relative or a good friend was
also targeted. Three have not.
160. Have the attackers ever threatened to send you to the “hospital” or the
“emergency room?”
Ten have been threatened with being sent to the emergency room or to the
hospital. Three have not.
161. Do the attackers lead you to believe that others are making fun of
you?
Twelve are led to believe that others make fun of them. Only one is not.
162. Do the attackers try to convince you that you are ugly, that you’re fat,
that you smell bad, or are otherwise undesirable?
All thirteen hear or have heard from their attackers that they are ugly or
otherwise undesirable.
163. Do the attackers encourage you to eat the wrong kinds of food or
perhaps eat and drink too much?
164. Do you sometimes hear other voices that you think that you are not
supposed to hear underlying or superimposed over or in the background of
the usual V2K?
Nine have at some point heard voices that they thought that they were not
actually supposed to hear. Four have NOT.
165. Do the attackers refer to you as being gay, try to make you believe
that you are gay, or tell you that others believe that you are gay?
61
Ten have had their V2K attackers suggest or attempt to convince them that
they were gay and/or that others thought that they were gay. Three have
NOT.
Set 9 Tabulations
166. Does one of the voices sound like somebody you know, perhaps a
relative, friend, or neighbor?
Eight have heard voices that sounded like somebody they knew. Five have
not.
167. Have your attackers ever insisted that you apologize to someone (but
they do not necessarily state why you should apologize)?
Eight have been told to apologize to someone for something. Five have
not.
168. Do your V2K speakers tell you that a family member or friend is
having a “nervous breakdown” or is losing his/her mind?
Only four have been told that someone they know is having a nervous
breakdown. Nine have not.
169. Have you ever seen in the night skies large stationary drones near
your house? [The drones can be easily spotted. They look like two bright
stars very close together on a horizontal plane. If you look more closely, in-
between the two bright lights at the bottom you can faintly see other far
smaller lights. They’ll usually be red, green, and natural colored. If the sky
is clear, the drones will be seen before the real stars appear.]
Seven have not seen drones. Six have seen them.
170. Have your V2K speakers ever said anything that suggests that they
are monitoring your heart beat, blood pressure, and other bodily functions?
[For example, whenever I am occasionally startled by a loud sound, an
obvious recording by my attackers states, “That scared the shit out of him!”]
Ten feel that their bodily functions are being monitored. Three do not.
171. Since you have been receiving the V2K, have you noticed
ripples/pulses in the calves of your legs or on other parts of your body?
62
Eleven have received ripples/pulses in their legs or other parts of the body.
Two have not.
172. Do you ever feel a kind of current that seems to be flowing through
your limbs or in other parts of your body?
Twelve have felt what seemed like a current flowing through their body.
Only one has not.
173. Have your attackers ever tried to convince you while you were in bed
that someone else was in the room in the darkness?
Seven have been led to believe that someone else was in the room with
them after they retired for the night. Six have not.
174. Have your attackers ever tried to make you think that a neighbor,
friend, or relative was responsible for some missing item?
Eight have been led to believe that a neighbor, friend, or relative was
responsible for a missing item. Five have not.
Eleven feel an artificial tickling or scratching in the throat or nose. One has
not. Another one was not sure.
176. Do you sometimes feel a tickling on the inside of your nostrils, your
ears, or in your eyebrows? [Hairs are believed by many targets to serve as
antennas.]
177. Does your scalp often itch and you find yourself clawing it, sometimes
waking from sleep to do so?
63
178. Have your speakers made statements that hint at their location? [The
V2K speakers sometimes inadvertently give clues about their whereabouts.
For example, one morning, one of my speakers stated that it was 6:00am.
It was actually 7:00am my time (Central). Thus, I knew that unless he was
being deceptive--and they are indeed masters of deception--he was in the
Rocky Mountain Time Zone.]
Seven have heard hints concerning the attackers’ locations. Five have not.
One answer was not clear.
179. Do your V2K speakers ever make statements or use the power of
suggestion obviously intended to affect your appearance? If so, please give
an example. [My V2K attackers often make the statement while I am
sleeping, “Look at the frown on his face!” They obviously are trying to
cause deep wrinkles on the forehead and face.]
Ten receive attackers’ statements or the power of suggestion to affect their
appearance adversely. Two do not. One answer was not clear.
180. Would you say that your V2K has intensified since it first began?
Seven believe that their V2K is now worse. Four say that it is not. Two say
that it is less than it was originally.
181. Has your natural sense of hearing diminished since you first received
the V2K?
Seven have not had their hearing affected. Six have had their hearing
damaged.
182. Are the voices equal in volume both inside and outside your domicile?
Eleven say that the volume is about the same both inside and outside. Two
state that it is not.
183. Do your V2K speakers ever tell you that loved ones or friends are
unfaithful to their partners and are cheating on them?
Seven are not told that a friend or loved one is unfaithful to his/her partner.
Six have been told that.
184. Have the V2K attackers ever shown that they’ve hacked your phone?
[For example, they use your phone numbers to call others and you find out
64
about it. Or you get a phone call and don’t answer. When you call that
number back, it is “disconnected or no longer in service.”]
Twelve have had their phone obviously hacked. One has not.
185. Do your attackers talk negatively about any particular group or
groups?
Ten hear negative comment from their attackers about particular groups.
Three do not.
186. Do your V2K speakers sometimes give you commands or use the
power of suggestion while you’re sleeping to make you do something? [For
example, they will often tell me “You have to go pee.” That, of course,
wakens me. Usually, I do have to go to urinate.]
Nine are given commands by their attackers about ordinary tasks that they
would be anyway. No are not. Two answers were not clear.
Set 10 Tabulations
187. Have the V2K speakers ever said anything that makes you think that
they may be religious or spiritual?
Eight participants have heard nothing from the V2K attackers to make
them think that the attackers were religious or spiritual. Three are told
that the attackers are Satanists. Two say that the attackers pretend to
be religious/spiritual.
188. Have your attackers ever shown any indication of compassion for you
in their attacks?
Seven have heard some degree of compassion expressed at some
point by the attackers. Six have not.
189. Have you ever asked your attackers why they targeted you?
Twelve have asked their attackers why they are targeted. One has not.
190. Have the attackers ever told you or suggested that they can see out of
your eyes? [For example, one day I forgot to remove my sunglasses when I
came in from outside. Shitface later said, “Take off those f—king shades!”]
65
Eleven have been led to believe that the attackers can see through
their eyes. One has not. Another one has not been told that they can
but he/she believes that they can.
191. Have the attackers ever told you that they can see everything that you
do?
Twelve have been convinced that the attackers can view everything
that they do. Only one has not experienced that.
192. Are you bothered by “restless legs,” especially when you sleep?
Eleven are bothered by restless legs after they retire for the night.
One has restless legs during the daytime but not at night while he/she
sleeps. One answer was unclear.
193. Have the attackers ever suggested or showed signs that they can see
through your own eyes?
Sorry, this question is very similar to 190.
194. Do the attackers mention a particular person’s name and attempt to
cause a sexual arousal?
Eight have had their attackers mention a particular person’s name
and then try to cause a sexual arousal in them. Five have not.
195. Have the attackers ever caused you to believe that they have a
panoramic view of everything that you do and everywhere that you go? [For
example, recently I forgot to take off my sunglasses when I came inside.
The main speaker later said, “Take off your f—king shades!”]
Nine believe that their attackers can see them wherever they go. Two
do not. One answer was unclear.
196. Do you ever feel the sensation of pinpricks on your body?
Twelve have felt pin pricks on the body. One has not.
197. Have you ever visited a psychiatrist or a psychologist because of your
targeting?
Twelve participants have visited a psychiatrist about their targeting.
Only one has not.
66
198. Since your targeting, have your eyes become extremely sensitive to
sunlight or bright lights?
Nine targets’ eyes are very sensitive to sunlight or bright lights due to
their targeting. Four targets’ eyes are not.
199. Have the attackers ever caused you to smell something that is not
normally found within your environment?
Twelve have smelled something that is not in their ambience. One has
not.
200. Have your attackers ever said anything that might indicate that they
are homophobic?
Nine say that their attackers appear to be homophobic. Two state that
they do not. One states that they at times have suggested that they
are both gay and non-gay. Another one believes that the attackers are
gay.
201. Have your attackers ever said anything that suggests that they are
xenophobic?
Ten say that the attackers suggest that they are xenophobic. Three
state that they do not.
202. In your interaction with the V2K speakers, do you insult and ridicule
them?
Twelve insult and ridicule the attackers. One does not talk to the
attackers.
203. Have the attackers ever caused you to see frightening holographic
images, particularly while you sleep?
Eleven have seen holographic images during their sleep; however, in
two cases they were not frightening. Two have not.
204. Do you attackers sometimes cause vibrations in your stomach or
otherwise cause problems with your stomach or digestive system?
All thirteen have digestive problems.
205. Are you often constipated and there appears to be no reason for your
constipation?
67
Nine have had constipation problems. Four have not.
206. Do your attackers discourage your social activities with friends and
relatives?
Ten are discouraged by attackers to engage in social activities with
others. Three are not.
207. Do your attackers attempt to make you take the wrong exit or
otherwise disorient you while you are driving?
Eight are made to take a wrong turn or are disoriented while driving.
Two are not. Two do not drive autos. One did not answer the
question.
68
V2K technology is effective in achieving attackers' goals as it can invisibly manipulate psychological states and subtly implant suggestions in the victims' minds, unlike overt physical methods. V2K induces paranoia and isolation without leaving physical evidence, enabling attackers to target victims continuously over great distances. The psychological impact is profound and lasting, as it targets the core of individual autonomy and mental health, fulfilling the attackers' aims of control more effectively than physical methods alone .
'Psychic driving' was developed by Canadian psychiatrist Ewen Cameron in collaboration with the CIA during the 1950s. This program involved methods such as forced listening to recorded materials and sleep deprivation to break down subjects. Its relevance to V2K attacks lies in the similar use of psychological manipulation techniques to achieve control over individuals by inducing anxiety and impairing cognitive functions. These attacks echo Cameron's methods by emphasizing mental over physical torturous impacts .
V2K attackers exploit targets' relationships by making threats against family members, suggesting others are also being targeted, and implying surveillance extends to the victims' social circles. They manipulate perceptions of loyalty and trust, aiming to isolate the target socially. This exacerbates the victim's sense of paranoia and helplessness, increasing their dependence on the false narratives constructed by the attackers, ultimately consolidating the attackers' psychological control .
Attackers use deception in V2K attacks by pretending to be law enforcement or investigators and making victims believe they are under constant surveillance. The implication is that victims are left feeling helpless and unable to trust their perceptions of reality. This deception fosters a state of anxiety that effectively disrupts the victim's ability to think critically and confidently, aligning with the attackers' goals of controlling the victim's thoughts and actions .
The manipulation of victims' sexual organs in electronic targeting induces feelings of shame and guilt, contributing to the victims' psychological burden. This tactic diminishes the victim's sense of control over their own body, heightening feelings of anxiety and helplessness. It supports the attackers' broader objectives by increasing psychological vulnerability and compliance, making it easier to manipulate victims in other areas of their lives .
Electronic targeting can be classified into several forms: (1) The first form uses highly classified devices to produce physical effects from a remote location. (2) The second form involves creating neurological or psychological effects, also from a distance. (3) Most targets experience both physical and neurological effects. This method uses voice-to-skull (V2K) technology. (4) The fourth form involves on-site harassment, including organized stalking and disruption of daily life activities, referred to as gang stalking or overt harassment. The study focuses on the first three forms, which are remote and do not involve physical contact, potentially occurring over large distances .
Gang stalking involves direct, on-ground harassment methods such as vandalism, spreading rumors, and physical surveillance, where attackers are often visibly present or can be perceived by the victims. In contrast, V2K attacks operate invisibly from a distance, utilizing technology to deliver voices and induce neurological effects without the attacker being seen or known to the victim. While gang stalking relies on social and environmental disruptions, V2K primarily leverages unseen technological manipulation for psychological torment .
Researchers counter the mass hysteria argument by highlighting the geographical and experiential diversity among victims, who independently report similar attacks and symptoms. This undermines the likelihood of a collective psychological phenomenon. Furthermore, victims often experience symptoms before seeking out others or information, which suggests external causation rather than self-generating paranoia. Critics fail to provide a consistent alternative explanation that aligns with the widespread reports and technical specifics of attacks .
V2K attackers rely primarily on psychological effects to exert control over their victims, often by inducing anxiety to impair rational thinking and physical health. They pretend to be authoritative figures like law enforcement to intimidate victims and use familiar voices and personal information to deceive them about the attacker's true identity. Historical precedent for these methods includes Ewen Cameron's 'psychic driving,' a method developed for the CIA involving psychological manipulation and physical discomfort to break down victims' resolve .
Common psychological effects include inducing feelings of guilt, shame, and anxiety, manipulating thoughts, and employing various threats, such as suggesting victims will go to jail or harm will come to their families. Physically, victims often experience discomfort and bodily monitoring. Psychology plays a significant role in reinforcing control, as it undermines self-worth and increases the victims' sense of helplessness, achieving the attackers' objective of controlling and breaking down the victim's resolve .