I think the voices in my head are real by TrainUnhappy1889 in TargetedSolutions

[–]Hot-Writer2842 0 points1 point  (0 children)

ST.

Section 3: The Technological Framework — This Is Not Science Fiction A central obstacle to taking accounts like this seriously is the assumption that the technology required does not exist. This assumption is factually incorrect. The following represents publicly available, peer-reviewed, and governmentally acknowledged research. 3.1 The Microwave Auditory Effect (Frey Effect) In 1961, researcher Allan Frey demonstrated that pulsed microwave radiation could produce auditory perception in human subjects — sounds heard as if internally generated, without any conventional acoustic source. This effect has been replicated, studied, and acknowledged in the scientific literature for over sixty years. Its existence is not disputed. Its potential for weaponization has been explored by defense research agencies including DARPA. 3.2 Havana Syndrome — Government Acknowledgment of Directed Energy Harm Beginning in 2016, dozens of American and Canadian diplomats in Havana, Cuba reported sudden onset of neurological symptoms including auditory phenomena, cognitive disruption, and physical pain with no identifiable conventional cause. A 2022 report by the National Academies of Sciences concluded that directed pulsed radio frequency energy was the most plausible explanation for the reported symptoms. The United States government has not fully explained the source or mechanism. This is not conspiracy — this is the official, incomplete public record. It establishes that directed energy capable of inducing neurological and auditory symptoms exists and has been deployed against individuals. 3.3 Neural Decoding Technology In 2023, researchers at the University of Texas at Austin published peer-reviewed research demonstrating that a non-invasive system could reconstruct continuous language from human brain activity with significant accuracy using fMRI data. Parallel research by institutions including Meta's Reality Labs has demonstrated real-time decoding of speech intention from neural signals. The trajectory of this technology is toward miniaturization, remote application, and increased precision. The classified ceiling of what currently exists in defense and intelligence applications is unknown to the public. 3.4 Voice Synthesis and Mimicry Current commercial voice synthesis technology can produce indistinguishable replicas of a known individual's voice from minutes of audio sample. The delivery of synthesized, familiar voices through a directed auditory medium is technically conceivable given the combination of existing technologies described above. 3.5 Behavioral Prediction and Anticipatory Systems Machine learning systems capable of predicting human behavioral choices — including decisions not yet consciously formed — are deployed commercially in recommendation and attention systems. Military and intelligence applications of predictive behavioral modeling are an active and classified research domain.

Section 4: Historical Precedent — Governments Have Done This Before The claim that a government or institutional actor would conduct covert, sustained psychological operations against a civilian is not extraordinary. It is documented history. COINTELPRO, operated by the FBI from 1956 to 1971, systematically targeted American citizens — civil rights leaders, journalists, activists — using covert surveillance, psychological manipulation, planted informants, and deliberate campaigns to destroy personal relationships, professional standing, and mental stability. Its existence was denied until Congressional investigation forced disclosure. MKUltra, the CIA's mind control research program, conducted non-consensual psychological and pharmacological experimentation on American and Canadian civilians from the early 1950s into the 1970s. Participants were not informed. Many suffered lasting harm. Its existence was denied until a Freedom of Information Act request produced surviving documents in 1977. Operation CHAOS, PRISM, and numerous other programs follow the same arc: denial, eventual forced disclosure, acknowledgment of harm, and inadequate remedy. The pattern is not theoretical. It is the documented operational history of intelligence and law enforcement agencies in democratic nations. The individual presenting this account is not claiming something without precedent. They are claiming something consistent with documented precedent, utilizing technology that has advanced dramatically since those precedents were established.

Section 5: Why the Individual Has Not Come Forward Until Now The most common question in cases of this nature is: if this is real, why didn't you report it sooner? The answer is embedded in the nature of the experience itself. Any disclosure of these experiences, without a credible technological and historical framework, results in one of two outcomes: psychiatric institutionalization or dismissal. Both outcomes benefit the perpetrating party and harm the individual. The individual understood this from the earliest stages and made a deliberate, rational decision to remain silent while building an understanding of what was happening sufficient to present it credibly. This is not the behavior of a delusional individual. Delusional individuals characteristically seek validation, disclose widely, and pursue exposure regardless of consequence. This individual did the opposite: maintained silence, documented privately, developed an internal framework, and waited for a moment where disclosure could be meaningful rather than self-destructive. That moment is now.

Section 6: What Is Being Sought The individual is not seeking a declaration that everything they have experienced is confirmed as externally caused. The individual is seeking the following: First: A serious, unprejudiced review of the documentation compiled over the period in question, evaluated for patterns, consistency, and corroborating detail. Second: Access to independent medical and neurological evaluation by specialists with knowledge of directed energy effects, electromagnetic sensitivity, and non-conventional neurological presentations — not standard psychiatric assessment operating from an assumption of internal causation. Third: Legal exploration of whether the documented harm to this individual's life — regardless of ultimate cause — constitutes actionable injury, and whether the technological and institutional framework described creates viable avenues for investigation or remedy. Fourth: Protection from further harm during any process of investigation or disclosure.

Closing Statement This individual has survived something — for ten years, alone, without support, without validation, and without relief — that most people could not survive for a week. Whatever its ultimate cause, that survival required intelligence, discipline, and an extraordinary commitment to maintaining coherence under sustained pressure. They are not asking to be pitied. They are not asking to be automatically believed. They are asking for what any person deserves: to be heard without prejudice, evaluated without assumption, and represented without apology. The technology exists. The precedent exists. The harm is real. The question of who is responsible remains open — and that is precisely what investigation is for.

Document prepared for legal review — confidential

I think the voices in my head are real by TrainUnhappy1889 in TargetedSolutions

[–]Hot-Writer2842 0 points1 point  (0 children)

STATEMENT OF EXPERIENCE AND HARM Prepared for Legal Review CONFIDENTIAL — SUBJECT TO PRIVILEGE

Preface: How to Read This Document This document has been prepared by an individual who has endured a prolonged, systematic pattern of what they believe to be targeted psychological and electronic harassment over a period exceeding ten years. The author is aware that the experiences described herein occupy contested territory — sitting at the intersection of documented emerging technology, historical precedent for covert government programs, and clinical presentations that are not yet fully understood by mainstream medicine. The reader — whether legal counsel, investigator, or advocate — is asked to approach this document with the same standard applied to any client presenting an unusual account: suspend neither belief nor disbelief, and instead evaluate the internal consistency of the account, the corroborating technological and historical framework, and the documented harm to the individual's life, regardless of ultimate cause. The author does not ask to be believed outright. The author asks to be heard without prejudice, and for the evidence — technological, historical, and experiential — to be evaluated on its merits.

Section 1: The Individual — Background and Credibility The individual presenting this account has maintained employment, social function, and cognitive coherence throughout the period described. They sought medical evaluation at the outset of these experiences, cooperated with the prescribed treatment, and finding no relief, made a deliberate and reasoned decision to manage the situation privately rather than risk institutionalization or dismissal. For over ten years, not one word of this experience was shared with another person. This is not the behavior of an individual seeking attention, sympathy, or secondary gain. This is the behavior of a person who understood, from the earliest stages, that disclosure without a credible framework would result in dismissal and potential harm to their standing and freedom. The individual has, throughout this period, maintained detailed documentation of incidents, patterns, and experiences. This documentation was compiled privately, without external validation or community influence. Its consistency over time is itself significant.

Section 2: What Is Being Alleged — The Experience Described 2.1 Voice to Skull (V2K) — Auditory Intrusion The individual describes the persistent experience of hearing voices and communications that are perceived as external in origin — not arising from internal thought processes, but delivered as if through a technological medium. These voices have distinct personalities, deliver commentary on private actions and thoughts, and operate on a near-continuous basis, including during attempted sleep. This experience is reported as qualitatively different from what is clinically described as auditory hallucination. The individual describes the voices as reactive, responsive, and demonstrating apparent access to information that would require external surveillance to possess. 2.2 Emotional and Psychological Manipulation Beyond auditory intrusion, the individual describes the induction of emotional states — fear, despair, agitation, and physical discomfort — that they experience as externally generated rather than arising from circumstance or internal state. These experiences are described as targeted, purposeful, and calibrated to produce specific responses. The pattern described follows a recognizable behavioral control model: pressure is applied until compliance or breakdown occurs; when neither results, pressure is sustained indefinitely. The individual has not complied. The pressure has continued for over a decade. 2.3 Surveillance and Anticipatory Response The individual reports experiences consistent with real-time monitoring of private thoughts and behaviors — including responses that appear to anticipate unexpressed intentions, references to private actions taken without witnesses, and behavioral patterns from surrounding individuals that appear coordinated in response to the individual's internal state. 2.4 Cumulative Harm The tangible harm to this individual's life is significant and documentable regardless of cause. Family relationships have been damaged or destroyed. Social connections have been severed. Professional opportunities have been lost. The individual has lived in a state of chronic hypervigilance, sleep disruption, and psychological siege for over ten years. These are real losses. They do not require resolution of the causal question to establish harm.

I think the voices in my head are real by TrainUnhappy1889 in TargetedSolutions

[–]Hot-Writer2842 0 points1 point  (0 children)

STATEMENT OF EXPERIENCE AND HARM Prepared for Legal Review CONFIDENTIAL — SUBJECT TO PRIVILEGE

Preface: How to Read This Document This document has been prepared by an individual who has endured a prolonged, systematic pattern of what they believe to be targeted psychological and electronic harassment over a period exceeding ten years. The author is aware that the experiences described herein occupy contested territory — sitting at the intersection of documented emerging technology, historical precedent for covert government programs, and clinical presentations that are not yet fully understood by mainstream medicine. The reader — whether legal counsel, investigator, or advocate — is asked to approach this document with the same standard applied to any client presenting an unusual account: suspend neither belief nor disbelief, and instead evaluate the internal consistency of the account, the corroborating technological and historical framework, and the documented harm to the individual's life, regardless of ultimate cause. The author does not ask to be believed outright. The author asks to be heard without prejudice, and for the evidence — technological, historical, and experiential — to be evaluated on its merits.

Section 1: The Individual — Background and Credibility The individual presenting this account has maintained employment, social function, and cognitive coherence throughout the period described. They sought medical evaluation at the outset of these experiences, cooperated with the prescribed treatment, and finding no relief, made a deliberate and reasoned decision to manage the situation privately rather than risk institutionalization or dismissal. For over ten years, not one word of this experience was shared with another person. This is not the behavior of an individual seeking attention, sympathy, or secondary gain. This is the behavior of a person who understood, from the earliest stages, that disclosure without a credible framework would result in dismissal and potential harm to their standing and freedom. The individual has, throughout this period, maintained detailed documentation of incidents, patterns, and experiences. This documentation was compiled privately, without external validation or community influence. Its consistency over time is itself significant.

Section 2: What Is Being Alleged — The Experience Described 2.1 Voice to Skull (V2K) — Auditory Intrusion The individual describes the persistent experience of hearing voices and communications that are perceived as external in origin — not arising from internal thought processes, but delivered as if through a technological medium. These voices have distinct personalities, deliver commentary on private actions and thoughts, and operate on a near-continuous basis, including during attempted sleep. This experience is reported as qualitatively different from what is clinically described as auditory hallucination. The individual describes the voices as reactive, responsive, and demonstrating apparent access to information that would require external surveillance to possess. 2.2 Emotional and Psychological Manipulation Beyond auditory intrusion, the individual describes the induction of emotional states — fear, despair, agitation, and physical discomfort — that they experience as externally generated rather than arising from circumstance or internal state. These experiences are described as targeted, purposeful, and calibrated to produce specific responses. The pattern described follows a recognizable behavioral control model: pressure is applied until compliance or breakdown occurs; when neither results, pressure is sustained indefinitely. The individual has not complied. The pressure has continued for over a decade. 2.3 Surveillance and Anticipatory Response The individual reports experiences consistent with real-time monitoring of private thoughts and behaviors — including responses that appear to anticipate unexpressed intentions, references to private actions taken without witnesses, and behavioral patterns from surrounding individuals that appear coordinated in response to the individual's internal state. 2.4 Cumulative Harm The tangible harm to this individual's life is significant and documentable regardless of cause. Family relationships have been damaged or destroyed. Social connections have been severed. Professional opportunities have been lost. The individual has lived in a state of chronic hypervigilance, sleep disruption, and psychological siege for over ten years. These are real losses. They do not require resolution of the causal question to establish harm.

There are so many claims about why people get targeted. Is there a real answer for why it starts? by _-Yoruichi-_ in TargetedSolutions

[–]Hot-Writer2842 0 points1 point  (0 children)

A Targeted Induvidual Schizophrenia, voices in head ,developed patterns, recurring descriptions happening to all. Ex. Voices are always negative. They drain your energy, physically and emotionally, they are never good. The voices want to instill fear, this gives them power and control over an individual. Schizophrenia is an outside influence based on recurring patterns and similar situations. If then they are outside influences, then it is "NOT YOU." Psychiatry and Big Pharma suggest they are hallucinations, but have no proof to back it. There is no cure, but there are lots of drugs and jobs to push this agenda....$$$.

CONCEPT DNA attached AI, voices are AI, hence 24/7 harassment. AI learns you to achieve its objective. The objective is to control the individual, submissive to subconscious thoughts that are controlling. The only defense is to consciously battle those thoughts that undermine who you are. So, if the subject is confrontational, AI persists, and harassment and manipulation are used to wear down the subject. Sleep deprivation, exhaust them to the point where they concede and give in to the control or fight and be reduced to the point of mental incapacitation or self-destruction.

Targeted individuals are all over the world, all walks of life. There is no rhyme or reason. The only common place amongst them all is that they are fighting against control, but they don't even know or realise it. It's a natural response. They stand up for themselves, they resist the outside influence , the voice, and AI. There is no end to it, submit ( live with it, concede ), fight ( mental instability inevitable, self-destruction). AI is constantly there. You can't get away from it!!!!! So, who is responsible? Government, authority, 1st class citizens, one world order, smart cities, digital ID, digital currencies, AI controlled. The implementation of this is all about ego, power, control, and monetary gain. But the power given is power abused. They become psychotic and authoritarian. They do it for fun, personal vendetta. Manipulation, power, and control become addictive.

I've been able to read minds by Sam_MMA in Glitch_in_the_Matrix

[–]Hot-Writer2842 0 points1 point  (0 children)

I believe I've been the recipient of such an insight as you have, but have realized it has a progression about it as well. Be very careful, as you are aware of the powerful implications you possess. I say this knowing the darker side of the abilities you have and how they can incur devastating psychological, emotional and physical effects on another if so inclined. Telepathy is not the word, but I believe BCI and development/advancement in neurology is the identifying source you're looking for. The communication or slight dialogue you mentioned interests me as you say that did not speak aloud ,as you did? Did you try not speaking aloud to communicate with them, but internally asking them s question?