The Neuro HolocaustThe AI worst case scenario is happening and our governments are complicit
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| home [09/12/2025 03:12] – [Campaign Plan] daniel | home [10/12/2025 22:58] (current) – [The Neuro Holocaust] daniel | ||
|---|---|---|---|
| Line 3: | Line 3: | ||
| ====== The Neuro Holocaust ====== | ====== The Neuro Holocaust ====== | ||
| - | A large-scale neurowarfare holocaust is currently being orchestrated against civilian populations worldwide. | + | Welcome to The Neuro Holocaust, a relentless exposé and real-time chronicle of an insidious assault. |
| - | Advanced | + | A shadow war rages in silence, unseen yet devastating: |
| - | Keep an eye on this website, I will be updating it regularly | + | Here, I unveil |
| - | {{ : | + | Stay vigilant—updates will unfold regularly in the coming months, transforming this evolving repository into an irrefutable testament. The evidence is real, tangible, and mounting. Join the revelation. |
| > “The gas chambers of Auschwitz were the ultimate consequence of the theory that man is nothing but the product of heredity and environment – or, as the Nazis liked to say, ‘of blood and soil.’ I am absolutely convinced that the gas chambers of Auschwitz, Treblinka, and Maidanek were ultimately prepared not in some ministry or other in Berlin, but rather at the desks and in the lecture halls of nihilistic scientists and philosophers.” -- Viktor E. Frankl | > “The gas chambers of Auschwitz were the ultimate consequence of the theory that man is nothing but the product of heredity and environment – or, as the Nazis liked to say, ‘of blood and soil.’ I am absolutely convinced that the gas chambers of Auschwitz, Treblinka, and Maidanek were ultimately prepared not in some ministry or other in Berlin, but rather at the desks and in the lecture halls of nihilistic scientists and philosophers.” -- Viktor E. Frankl | ||
| + | |||
| + | {{ : | ||
| In this wiki, when a link is red I have yet to document it. When it is yellow, evidence has been added. | In this wiki, when a link is red I have yet to document it. When it is yellow, evidence has been added. | ||
| Line 21: | Line 23: | ||
| ===== Background and Research ===== | ===== Background and Research ===== | ||
| - | {{ :screenshot_2025-12-09_at_04.05.26.png?nolink |}} | + | {{ :banner-background-research.png?nolink |}} |
| For decades, the anguished testimonies of targeted individuals—those ensnared in invisible webs of neurowarfare and directed-energy torment—have been met with a wall of disbelief, a scepticism as understandable as it is heartbreaking, | For decades, the anguished testimonies of targeted individuals—those ensnared in invisible webs of neurowarfare and directed-energy torment—have been met with a wall of disbelief, a scepticism as understandable as it is heartbreaking, | ||
| Line 27: | Line 29: | ||
| In this shadow, we must acknowledge a painful truth: some among them do grapple with psychiatric disorders, shadows of the mind that amplify their cries and cloud the lens through which the world views them. But herein lies the unyielding core of justice—any affliction, real or inflicted, does not erase their status as victims, whether they do or do not have psychiatric history; it does not render their targeting any less savage or systemic, any less a deliberate erosion of autonomy by faceless powers. | In this shadow, we must acknowledge a painful truth: some among them do grapple with psychiatric disorders, shadows of the mind that amplify their cries and cloud the lens through which the world views them. But herein lies the unyielding core of justice—any affliction, real or inflicted, does not erase their status as victims, whether they do or do not have psychiatric history; it does not render their targeting any less savage or systemic, any less a deliberate erosion of autonomy by faceless powers. | ||
| - | These neuroweapons have perfected the concentration camp in digital form: no barbed wire, no watchtowers, | + | These neuroweapons have perfected the concentration camp in digital form: no barbed wire, no watchtowers, |
| + | |||
| + | NATO pretends to be the bastion of freedom and civilization, | ||
| Detection is notoriously difficult—telecom-tower based frequency-agile radar is used which is almost impossible to capture, and most standard medical imaging and EEG systems are blind to the specific pulsed radiofrequency and ultrasonic signatures, and the effects are designed to mimic “functional” or “psychosomatic” illness so perfectly that even conscientious clinicians unwittingly become accomplices in the cover-up. | Detection is notoriously difficult—telecom-tower based frequency-agile radar is used which is almost impossible to capture, and most standard medical imaging and EEG systems are blind to the specific pulsed radiofrequency and ultrasonic signatures, and the effects are designed to mimic “functional” or “psychosomatic” illness so perfectly that even conscientious clinicians unwittingly become accomplices in the cover-up. | ||
| - | After five years of relentless reverse-engineering, | + | After five years of relentless reverse-engineering, |
| - | It is high time that justice, long deferred, is served with the unflinching rigour it demands, piercing the veil of denial to hold perpetrators to account. This website, The Neuro Holocaust, stands as a global beacon for targeted individuals worldwide, beginning with the raw, meticulously documented chronicle of my own case—a Dutch citizen' | + | The invisible camp is about to have its walls measured, mapped, and torn down.It is high time that justice, long deferred, is served with the unflinching rigour it demands, piercing the veil of denial to hold perpetrators to account. |
| + | This website, The Neuro Holocaust, stands as a global beacon for targeted individuals worldwide, beginning with the raw, meticulously documented chronicle of my own case—a Dutch citizen' | ||
| - | Read the research here: | + | Read my research here: |
| - [[2016_neuroweapon_deployment|Unraveling Mental Health Search Trends: A 2016 Neuroweapon Deployment Model and Its Implications]] | - [[2016_neuroweapon_deployment|Unraveling Mental Health Search Trends: A 2016 Neuroweapon Deployment Model and Its Implications]] | ||
| - [[rollout|Replication Report: Integrated Analysis of ITU Rollouts, Mental Health Trends, Disease Outbreaks, and the Targeted Individuals Phenomenon (1975–2025)]] | - [[rollout|Replication Report: Integrated Analysis of ITU Rollouts, Mental Health Trends, Disease Outbreaks, and the Targeted Individuals Phenomenon (1975–2025)]] | ||
| Line 43: | Line 48: | ||
| - [[oran|Exploiting O-RAN Vulnerabilities for Directed Energy Weapons: | - [[oran|Exploiting O-RAN Vulnerabilities for Directed Energy Weapons: | ||
| Capabilities, | Capabilities, | ||
| + | - [[torture_markers|Markers of Torture in Targeted Individuals]] | ||
| ----- | ----- | ||
| Line 61: | Line 67: | ||
| All evidence is presented exactly as originally collected, with originals preserved offline and with notaries where possible. | All evidence is presented exactly as originally collected, with originals preserved offline and with notaries where possible. | ||
| + | |||
| + | ==== Full Chronological Report of Events (2020 – November 2025) ==== | ||
| + | |||
| + | All statements reproduced verbatim, in exact chronological order. | ||
| + | |||
| + | * In 2020 I developed neurological and psychiatric complaints. | ||
| + | * I quickly found out I was being targeted with a radio-frequency weapon, and it didn’t take long to figure out it came from the telecom towers. I began researching this in 2021. | ||
| + | * In 2021 my domain azulay.nl, which bears my last name, was redirected to a porn spam site, outside of my control. | ||
| + | * I tried to engage with the intelligence agencies but was ignored completely. | ||
| + | * Then I started being hacked all the time, leading to data loss. This was obviously to thwart my research. | ||
| + | * In 2021 I developed such bad symptoms that I spent a week in a mental ward. Voices had been threatening me that I would be killed, that I was a terrorist, that I was a psychopath, that I was a pedophile, and it was insinuated that if I continued researching, | ||
| + | * I got so sick from my medication that I decided to stop using it, as it was interfering with my ability to work. But I also decided to look for a job in another field. | ||
| + | * In this last period at that employer, the hacking started again. I suffered massive data loss again, with my Proton Drive being hacked, and passwords for both my private and my work laptop being changed outside of my control. This happened moments after voices claimed “we are in your laptop”. I had to give my work laptop back to my employer in locked-out state. | ||
| + | * I began to research again, and the hacking intensified, | ||
| + | * In July 2023 I went for an MRI. The MRI CD-ROM came back with corrupted DICOM images; it was unreadable, with the images showing white-out; they had been tampered with. There is record of me emailing the MRI centre about this. A little bit later I went for an EEG at a hospital in Amsterdam. The EEG results never arrived so I phoned the hospital. They checked and found the EEG results had been returned to the hospital. The hospital then resent them to me. The envelope in which the EEG results were sent was torn open and had blue tape on it to close the envelope, again showing signs of tampering. | ||
| + | * In September I was really starting to understand that the telecom towers were indeed being used as weapons on civilians. I wrote my first article about it and sent it around, and also filed a complaint with the CTIVD. | ||
| + | * 48 hours after sending around my first article, I was attacked with what could only have been Havana Syndrome. I had extreme tinnitus, saw black spots, had balance issues, pain in the extremities, | ||
| + | * I was hospitalised. Instead of getting the neurological workup I asked for, given that my complaints warranted urgent neurological examination by all standards, I was locked up in the mental ward. | ||
| + | * I had requested my data months earlier (in July) from both the MIVD and the AIVD, as the voices claimed to be from these agencies. Both agencies failed to produce my dossier on time. And the OM sent their letter that I was not allowed to leave the hospital unless medicated 3 weeks too late. | ||
| + | * In January 2024 I left the hospital, medicated, but still hearing voices and having complaints. I decided to try working again so I found a job. I knew I had been forced into medication with the weapons I describe, and at some point I had really had enough, so I stopped taking the medication again. The torture began to take on extreme forms. | ||
| + | * I tried to engage with intelligence agencies but again with no response whatsoever. This is when I started planning to escape NATO, because it started to dawn on me that a peculiar type of holocaust was being orchestrated, | ||
| + | * I visited my dying father in August 2025; the torture got particularly intense the week before I had to fly to the UK, but I powered through. | ||
| + | * When I had told my father about what was happening, he wanted to help me financially as I was struggling to keep my head above water. His bank account was mysteriously disabled a day later. | ||
| + | * In September 2025 a leading Belgian neuropsychiatrist finally capitulated and said he believes my account and that I have very serious material, but that he could not afford to be involved (because of the implications and the danger to himself). | ||
| + | * I came back to the Netherlands and made real plans to flee NATO. I would try to claim asylum in Russia. I also wanted to hand over all my research to Russian intelligence in the hope that they would be powerful enough to stop what is happening. | ||
| + | * I was on temporary disability with the UWV. But something was wrong, I was not receiving any money. I left for China, to go to the Russian border via Harbin. | ||
| + | * The week before I left I had ordered two USB sticks to back up my research for Russian intelligence or perhaps the Chinese MSS if I would wind up engaging with them instead. The USB sticks never arrived. I quickly ordered two replacements which arrived one day before departure. | ||
| + | * I thought I was copying my files to one of the USB sticks, when I figured out my laptop had a USB exploit where when I put in a USB stick a sneaky filesystem overlay appears in place of the USB storage. I don’t remember how I disabled it but I was able to copy my files to the USB sticks. | ||
| + | * Also, in July or August, I discovered a malware binary, visible in my firewall (Little Snitch) that was phoning home to an area nearby a UK sigint base. This binary was called “lyrebird” and my research indicates it is for voice cloning, to aid in defamatory impersonation operations. | ||
| + | * In the same period where I found the " | ||
| + | * In Harbin, before boarding the train to Russia, I suffered a three-fold attack with a cognitive as well as a cyber component. The cognitive component was RF-induced neurological symptoms that made me completely disorientated, | ||
| + | * In Russia I was interrogated for 48 hours, apparently my intelligence caused quite the stir. The military came and told me I was going to be taken to Novosibirsk the next day. They took my laptop and phone for analysis. Unfortunately I had made a single 20 euro donation to Ukraine some months before, which did not amuse them at all, but by the looks of it they still wanted to take me to Novosibirsk (one officer said “don’t worry, it’s you, tomorrow we go!”). I was treated well, even if I wasn’t allowed to roam around but was confined to a room. | ||
| + | * But the Novosibirsk trip never materialised. Instead I heard “we are sorry but we’ve found something else on your laptop, and you are not allowed at the moment to enter Russia. You can maybe pick up your stuff in 5 weeks after analysis.” I was only allowed to take my SIM card. I decided to try to find my way back to Shanghai to fly back home because there was no way I would last 5 weeks in China with only a SIM card. | ||
| + | * After leaving Russia, I slept for one night in Suifenhe. Chinese border guards interrogated me upon arrival, and wanted to see the contents of my bag. They didn’t seem very amused, but let me continue. I carried on to find a hotel for one night. A taxi driver tried to arrange a hotel for me. The hotel maid looked in the computer and an animated conversation between the two began. Something was wrong. The man then turned to me, angered, and said “young lady, you not very polite!”. This is when I realised the 2020–2021 threats had materialised: | ||
| + | * Then the next day the taxi driver returned. But his demeanour was totally changed. He approached me with a big smile, gave me a firm handshake, and behaved very unlike someone would behave towards someone with CSAM material on their laptop. This means Chinese intelligence had realised what happened, perhaps themselves, perhaps they heard it from Russia, and they had changed the information about me that was circulating. The taxi driver told me all sorts of things and asked a lot of questions, in a friendly manner. He then pointed to a picture on his phone of a Chinese military officer hoisting the Chinese flag, and then to a picture of a Dutch cyclist, and said something along the lines of “we are friends”. The next 24 hours I went from Suifenhe to Harbin to Shanghai. | ||
| + | * I flew through Qatar to Amsterdam. In Qatar airport I walked into a smoking lounge. There were a lady and a man seated at a table. The man looked British and never made eye contact. But as soon as I walked into the lounge, I heard him say without even looking at me, “I came on the same flight you did, from Shanghai”. I immediately knew this man was an intelligence operative. Was it a threat? Or was he there to make sure nothing happened to me? I couldn’t quite work it out. When I left the smoking lounge I commented “chin chin”, he didn’t look at me and said nothing. | ||
| + | * Back home, I managed to fix my UWV situation and was given 3 months’ worth of money. I immediately bought a new MacBook Pro and began writing everything I know. I was also able to recover much older research which I thought I had lost, but was present on an old hard drive. | ||
| + | * I wrote an article on Havana Syndrome, on exploits against Open-RAN, analysed my own medical case, and did much more research. | ||
| + | * A shared folder in Proton Drive that I had shared with the Moskowicz law firm was tampered with. I saw in real time how my files began to disappear, and in place thereof a Microsoft Teams installer appeared. I tried to quarantine this binary, but the zip file in which I had put it mysteriously became unreadable. | ||
| + | * The attacks intensified. I then did a malware analysis on the phone I had used in 2023 during my hospitalisation. I found traces of state-sponsored malware. This means I was targeted with state-sponsored malware in the same year I was hit with Havana Syndrome. This type of malware is very expensive and only used on journalists and politicians who research sensitive matters. | ||
| + | * Then I began ordering items, and these orders began disappearing in transit. The first order that disappeared had cognitive enhancers to protect my brain. The second was an order containing two HackRF One boards with which I could analyse the part of the spectrum where I thought this weapon operates. The third order that went missing was a hard drive meant for backing up my research. In this last order, I proved that although track and trace showed the item was in the parcel shop, the parcel shop computer had no trace of it. | ||
| + | * Another item that went missing was a package with my research sent to the police with on the envelope written “request for protection”. The only entity capable of this in the Netherlands is the AIVD. This meant that the AIVD was also behind the rest of my disappearing packages, from the USB sticks before departure to China, to the defensive items purchased after coming back. | ||
| + | * I filed a WOO request with the Ministry of Justice and Security to find out why my package to the police had been intercepted. This WOO request disappeared from government systems; it could not be found 4 weeks later. This was more obstruction on the part of the AIVD. | ||
| + | * In November 2025 I proved conclusively that there is a radio-frequency system aimed at my head; there is video evidence of my measurements, | ||
| + | * In November 2025 I received a PTSD diagnosis and this therapist commented that she also believes my account and wished that I would speak to the police very soon. | ||
| + | |||
| + | ==== Conclusion: Clear Pattern of Systematic Suppression ==== | ||
| + | |||
| + | The events described above reveal an unmistakable, | ||
| + | |||
| + | * a smear campaign in 2021 whereby my personal domain azulay.nl was maliciously redirected to a porn spam site in order to discredit my name; | ||
| + | * early and repeated cyber exploits causing deliberate data loss; | ||
| + | * a debilitating Havana-Syndrome attack launched exactly 48 hours after I completed and circulated my first substantive article; | ||
| + | * MIVD and AIVD deliberately failing to honour lawful data requests, timed to coincide with my hospitalisation; | ||
| + | * deployment of state-sponsored malware (normally reserved for high-value journalists and politicians) against both my private and work devices; | ||
| + | * complete non-response from the CTIVD to my formal complaint; | ||
| + | * real-time interference with attempts to share evidence with the Moskowicz law firm; | ||
| + | * physical interdiction or disappearance of parcels containing research sent to the police and of multiple orders for defensive and measurement equipment (cognitive enhancers, HackRF One boards, hard drives, USB sticks); | ||
| + | * the vanishing of an official WOO request from government systems; | ||
| + | * an attempt to frame me with terrorism charges; | ||
| + | * and, as the single most extreme and reprehensible act in this campaign, the probable planting of CSAM material on my laptop while I was travelling in China so as to frame me, ensure my arrest in Russia, and expose me to the near-certain prospect of severe beating or death in a Russian prison — a threat explicitly made to me in 2020–2021 and ultimately carried out when I attempted to deliver my research to a foreign power. | ||
| + | |||
| + | Taken together, these actions demonstrate a coordinated campaign whose obvious objective has been to prevent the documentation, | ||
| + | |||
| + | ==== Final Concluding Paragraph: Inference and Call for Investigation ==== | ||
| + | |||
| + | The extraordinary breadth, sophistication, | ||
| + | |||
| + | The fact that the official oversight body (CTIVD) has remained completely silent, combined with the demonstrable obstruction and evidence-tampering by entities under its theoretical supervision, | ||
| + | |||
| + | ---- | ||
| + | |||
| + | ===== List of Crimes Committed ===== | ||
| + | |||
| + | {{: | ||
| + | |||
| + | ==== Full list of violations of Dutch criminal law with English translations ==== | ||
| + | |||
| + | ^ Nr. ^ Strafbaar feit (Nederlands) ^ English translation ^ | ||
| + | | 1 | Marteling | Torture | | ||
| + | | 2 | Misdrijven tegen de menselijkheid – systematische aanval op burgerbevolking | Crimes against humanity – systematic attack on civilian population | | ||
| + | | 3 | Zware mishandeling met voorbedachten rade | Aggravated assault with premeditation | | ||
| + | | 4 | Bedreiging met dood of zwaar lichamelijk letsel | Threatening with death or serious bodily harm | | ||
| + | | 5 | Poging tot moord / uitlokking tot moord | Attempted murder / incitement to murder | | ||
| + | | 6 | Valsheid in geschrift (o.a. medische dossiers, Woo-verzoek, | ||
| + | | 7 | Computervredebreuk en aftappen van gegevens | Computer intrusion and illegal interception of data | | ||
| + | | 8 | Opzettelijke benadeling van de gezondheid | Intentional endangerment of health | | ||
| + | | 9 | Onvrijwillige opsluiting en gedwongen psychiatrische behandeling | Unlawful detention and forced psychiatric treatment | | ||
| + | | 10 | Diefstal en verduistering van post/ | ||
| + | | 11 | Post- en telecommunicatiegeheim schenden | Violation of postal and telecommunications secrecy | | ||
| + | | 12 | Lidmaatschap en leiding geven aan een criminele organisatie | Membership in and directing a criminal organisation | | ||
| + | | 13 | Misbruik van overheidsbevoegdheid (Wiv 2017) | Abuse of authority under the Intelligence and Security Services Act | | ||
| + | | 14 | Overtreding Telecommunicatiewet / onrechtmatig spectrumgebruik | Violation of the Telecommunications Act / unlawful use of radio spectrum | | ||
| + | | 15 | Overtreding Wet wapens en munitie (gebruik verboden energiewapens) | Violation of the Weapons and Munitions Act (use of prohibited directed-energy weapons) | | ||
| + | | 16 | Schending medisch beroepsgeheim en medische ethiek | Breach of medical confidentiality and medical ethics | | ||
| + | | 17 | Belemmering van een Woo-verzoek | Obstruction of a Freedom of Information (Woo) request | | ||
| + | | 18 | Identiteitsfraude en oplichting | Identity fraud and deception | | ||
| + | | 19 | Psychische terreur / stalking | Psychological terror / stalking | | ||
| + | |||
| + | ==== Full list of violations of the Dutch Constitution (Grondwet) with English translations ==== | ||
| + | |||
| + | ^ Nr. ^ Schending (Nederlands) ^ English translation ^ | ||
| + | | 1 | Schending van de onaantastbaarheid van het lichaam (art. 11 Grondwet) | Violation of the inviolability of the body | | ||
| + | | 2 | Schending van het recht op persoonlijke levenssfeer (art. 10 Grondwet) | Violation of the right to privacy | | ||
| + | | 3 | Schending van het brief-, telefoon- en telegraafgeheim (art. 13 Grondwet) | Violation of the secrecy of correspondence, | ||
| + | | 4 | Schending van de vrijheid van meningsuiting (art. 7 Grondwet) | Violation of the freedom of expression | | ||
| + | | 5 | Onrechtmatige vrijheidsbeneming (art. 15 Grondwet) | Unlawful deprivation of liberty | | ||
| + | | 6 | Schending van het recht op gelijke behandeling (art. 1 Grondwet) | Violation of the right to equal treatment | | ||
| + | | 7 | Schending van het recht op toegang tot de rechter (art. 17 Grondwet) | Violation of the right to access to justice | | ||
| + | | 8 | Schending van het verbod op foltering en onmenselijke behandeling (art. 11 jo. art. 3 EVRM) | Violation of the prohibition on torture and inhuman treatment | | ||
| + | |||
| + | ==== Full list of violations of international (human rights) law with English translations ==== | ||
| + | |||
| + | ^ Nr. ^ Schending (Nederlands) ^ English translation ^ | ||
| + | | 1 | Marteling (art. 3 EVRM; art. 7 IVBPR; art. 1 VN-Martelverdrag) | Torture | | ||
| + | | 2 | Onmenselijke of vernederende behandeling (art. 3 EVRM) | Inhuman or degrading treatment | | ||
| + | | 3 | Schending van het recht op vrijheid en veiligheid (art. 5 EVRM) | Violation of the right to liberty and security | | ||
| + | | 4 | Schending van het recht op een eerlijk proces (art. 6 EVRM) | Violation of the right to a fair trial | | ||
| + | | 5 | Schending van het recht op eerbiediging van privéleven (art. 8 EVRM) | Violation of the right to respect for private life | | ||
| + | | 6 | Schending van de vrijheid van meningsuiting (art. 10 EVRM) | Violation of the freedom of expression | | ||
| + | | 7 | Misdrijven tegen de menselijkheid (art. 7 Rome Statute) | Crimes against humanity | | ||
| + | | 8 | Schending van het recht op gezondheid en lichamelijke integriteit (art. 8 IVBPR; art. 12 IVESCR) | Violation of the right to health and bodily integrity | | ||
| + | | 9 | Schending van het verbod op willekeurige inmenging (art. 17 IVBPR) | Violation of the prohibition on arbitrary interference | | ||
| ---- | ---- | ||
| Line 67: | Line 196: | ||
| ===== Evidence Clusters ===== | ===== Evidence Clusters ===== | ||
| - | {{ :screenshot_2025-12-09_at_04.01.37.png?nolink |}} | + | {{ :banner-evidence-clusters.png?nolink |}} |
| - | - 2020 – [[cluster_1|Onset | + | The site presents this not as a series |
| - | - 2021 - [[cluster_25|Smear campagin where personal website redirected on DNS-level to a porn-spam domain outside of the control of the hosting party]] | + | |
| - | - 2021, 2023 and 2024 – [[cluster_2|Remote password changes on multiple personal and work laptops without user input (data destruction in 2023)]] | + | |
| - | - 2022 – [[cluster_6|Sleep-triggered RF emissions captured on professional meter (explosive clicking correlated exactly with sleep onset)]] | + | |
| - | - July 2023 – [[cluster_4|MRI CD-ROM fully corrupted + EEG results returned in tampered envelope]] | + | |
| - | - December 2023 – [[cluster_3|Sudden extreme tinnitus, visual blackouts, memory loss, muscle twitches, pain and vestibular issues akin to Havana Syndrome → forced psychiatric admission without neurological workup despite contradictory | + | |
| - | - December 2023 – [[cluster_5|AIVD/ | + | |
| - | - 2023 to 2025 - [[cluster_16|Best friend independently developed identical mechanical twitching and hypnagogic whole-body vibration]] | + | |
| - | - 2023 to 2025 - [[cluster_18|Progressive high-frequency hearing loss (8 kHz → broadening) on official audiograms 2023 & 2025 matching primary tinnitus tone]] | + | |
| - | - July 2025 – [[cluster_8|Live remote deletion of files in Proton Drive + weaponised Microsoft Teams installer planted in lawyer-shared folder]] | + | |
| - | - July 2025 – [[cluster_9|LinkedIn post selectively removed only when profanity triggered automated “illegal goods” flag]] | + | |
| - | - July 2025 – [[cluster_10|ChatGPT request-forgery / man-on-the-side attack, UMC Utrecht falsified records, fake name given by bio-lab employee | + | |
| - | - July 2025 - [[cluster_22|ChatGPT request-forgery / man-on-the-side attack inserting a chinese unicode character designed to intimidate while engaged in research into cognitive warfare]] | + | |
| - | - July 2025 - [[cluster_17|Discovery of “lyrebird” malware on MacBook establishing persistent C2 to RAF Spadeadam (UK electronic-warfare range) regardless of VPN settings]] | + | |
| - | - August 2025 – [[cluster_12|Immediate disabling of father’s UK bank account after full disclosure to him]] | + | |
| - | - September 2025 – [[cluster_11|Russia/ | + | |
| - | - September 2025 – [[cluster_19|Statement by world class Belgian neuropsychiatrist | + | |
| - | - September–December 2025 – [[cluster_21|Systematic interception/ | + | |
| - | - October 2025 – [[cluster_7|Forensic report confirming Pegasus/ | + | |
| - | - November 2025 – [[cluster_14|Unlawful AIVD interception of registered package sent to the police via fake courier rerouting to suppress research into neuroweapons]] | + | |
| - | - November 2025 – [[cluster_15|Persistent directed 2548–2553 MHz carrier exhibiting physically impossible operator-switching behaviour; not detected during official measurement by Rijksdienst Digitale Infrastructuur or kept secret]] | + | |
| - | - December 2025 – [[cluster_20|Confirmed internal disappearance of Woo-request kenmerk EM2943979 inside government systems]] | + | |
| - | - December 2025 - [[cluster_23|Evidence of frequency-agile radar pulses | + | |
| - | - December 2025 - [[cluster_24|External trigger and intercept of spotify " | + | |
| - | Each evidence | + | - 2020 – [[cluster_1|V2K Voice-to-Skull Attacks Begin – Explicit V2K voices label victim as terrorist, pedophile, or psychopath, issuing threats of framing and life destruction in neurowarfare campaign.]] |
| - | | + | - 2021 - [[cluster_25|DNS Hijacking Smear Campaign – Personal website redirected at DNS level to porn-spam domain beyond hosting control, amplifying targeted harassment.]] |
| - | | + | - 2021, 2023 and 2024 – [[cluster_2|Remote Laptop Hacking – Unauthorized password changes on personal and work laptops, including data destruction in 2023 via remote cyber intrusions.]] |
| - | | + | - 2022 – [[cluster_6|RF Emissions During Sleep – Professional meter captures explosive clicking RF signals precisely at sleep onset, indicating directed energy weapon use.]] |
| - | | + | - July 2023 – [[cluster_4|Tampered Medical Records – MRI CD-ROM fully corrupted; EEG results delivered in altered envelope, suggesting medical data sabotage.]] |
| - | | + | - October 2023 – [[cluster_3|Havana Syndrome – Sudden severe tinnitus, blackouts, memory loss, muscle twitches, pain, and vestibular issues lead to forced psychiatric admission without neurological tests, despite |
| - | | + | - December 2023 – [[cluster_5|Delayed Intelligence Dossiers – AIVD/MIVD personal file requests intentionally stalled until post-hospitalization in cognitive warfare operation.]] |
| - | | + | - 2023 to 2025 - [[cluster_16|Shared Neurological Effects – Best friend experiences identical mechanical twitching and hypnagogic vibrations, pointing to contagious neuroweapon exposure.]] |
| + | - 2023 to 2025 - [[cluster_18|Progressive Hearing Damage – Official audiograms show high-frequency hearing loss (starting at 8 kHz) matching tinnitus tone, linked to directed energy assaults.]] | ||
| + | | ||
| + | - July 2025 – [[cluster_9|Selective LinkedIn Censorship – Post removed only after profanity triggers " | ||
| + | - July 2025 – [[cluster_10|ChatGPT Man-on-the-Side Attack 1 – Falsified UMC Utrecht medical file and simultaneous request forgery that lures victim to a bio-lab with expired ISO certification where employee uses fake name.]] | ||
| + | - July 2025 - [[cluster_22|ChatGPT Man-on-the-Side Attack 2 – Request forgery inserts intimidating Chinese Unicode character during cognitive warfare research.]] | ||
| + | - July 2025 - [[cluster_17|Lyrebird Malware Discovery – MacBook infected with malware maintaining C2 link to RAF Spadeadam UK electronic warfare range, bypassing VPN in persistent threat.]] | ||
| + | - August 2025 – [[cluster_12|Bank Account Sabotage – Father' | ||
| + | | ||
| + | | ||
| + | - September–December 2025 – [[cluster_21|Parcel Interceptions – Valuable packages, including HackRF One SDRs, stolen via forged Amazon/ | ||
| + | | ||
| + | | ||
| + | | ||
| + | | ||
| + | - December 2025 - [[cluster_23|Targeted Radar Pulses – Frequency-agile radar in LTE channel 7 activates only near victim' | ||
| + | - December 2025 - [[cluster_24|Spotify Account Compromise – External trigger and intercept of " | ||
| + | - December 2025 - [[cluster_26|RDI FOIA Obstruction - The RDI/ | ||
| + | - December 2025 - [[cluster_27|Microsoft E-mail Block - Microsoft blocks delivery of neuro-holocaust evidence to UN human rights bodies]] | ||
| ----- | ----- | ||
| Line 107: | Line 231: | ||
| ===== Bayesian Model Comparison Framework ===== | ===== Bayesian Model Comparison Framework ===== | ||
| - | {{ :screenshot_2025-12-09_at_04.02.27.png?nolink |}} | + | {{ :banner-bayesian-framework.png?nolink |}} |
| + | |||
| + | In this Bayesian model comparison, four competing hypotheses are rigorously evaluated against a set of 25 documented events—spanning from voice-to-skull attacks in 2020 to official refusals to investigate anomalous signals in December 2025—assuming access to objective evidence such as RF meter logs, audiograms, and expert validations. | ||
| + | |||
| + | Employing weakly informative priors that favour H₃ a priori (P(H₃) = 0.70) due to Occam' | ||
| Here are the four hypotheses exactly as defined and evaluated throughout the analysis: | Here are the four hypotheses exactly as defined and evaluated throughout the analysis: | ||
| Line 116: | Line 244: | ||
| * H₄: Random technical/ | * H₄: Random technical/ | ||
| - | To rigorously assess the hypotheses given the available evidence from the documented events (assuming full evidentiary access, including raw data like RF meter logs, audiograms, tracking anomalies, medical records, and expert statements), | + | To rigorously assess the hypotheses given the available evidence from the documented events (assuming full evidentiary access, including raw data like RF meter logs, audiograms, tracking anomalies, medical records, and expert statements), |
| - | **Prior Model Probabilities** | + | ==== Prior Model Probabilities |
| - | We adopt weakly informative priors reflecting baseline plausibility in a high-stakes, | + | We adopt weakly informative priors reflecting baseline plausibility in a high-stakes, |
| - | {{: | + | These sum to 1, with H₃ (psychiatric illness + coincidence) favoured a priori due to Occam' |
| - | These sum to 1, with H₃ (psychiatric illness + coincidence) favoured | + | Event-Wise Likelihood Computation For each event e_k (k=1 to 25, chronological), |
| - | The posterior for each model is: | + | |
| - | {{: | + | |
| - | + | * H₂: (disjoint criminal/ | |
| - | where the marginal likelihood P(E | Hi) is approximated via the product of event-wise likelihoods, | + | * H₃: (psychiatric + coincidence): |
| - | + | * H₄: (random errors): High for isolated glitches (e.g., tracking forgeries, lost FOIAs), low for patterns. Base p = 0.60, -0.15 for temporal clustering (e.g., 2025 surge). | |
| - | **Event-Wise Likelihood Computation** | + | |
| - | For each event e_k (k=1 to 13, chronological), | + | |
| - | + | ||
| - | * **H₁:** (coordinated state campaign): High predictability for adaptive targeting (e.g., RF emissions during sleep, parcel interceptions post-research). Base p = 0.90, adjusted +0.10 for corroborated elements (e.g., expert statement, impossible carrier switching). | + | |
| - | | + | |
| - | | + | |
| - | | + | |
| To compute these precisely, I executed the following Python code (stateful REPL environment with NumPy/SciPy for binomial log-likelihoods): | To compute these precisely, I executed the following Python code (stateful REPL environment with NumPy/SciPy for binomial log-likelihoods): | ||
| Line 145: | Line 265: | ||
| from scipy.stats import bernoulli | from scipy.stats import bernoulli | ||
| - | # Event indices (13 events) | + | # Event indices (25 events) |
| - | n_events = 13 | + | n_events = 25 |
| # Base success probabilities per hypothesis | # Base success probabilities per hypothesis | ||
| Line 158: | Line 278: | ||
| adjustments = [ | adjustments = [ | ||
| [0.10, -0.05, -0.10, -0.10], | [0.10, -0.05, -0.10, -0.10], | ||
| - | [0.05, 0.10, -0.05, 0.00], | + | [0.10, 0.05, -0.15, -0.05], |
| - | [-0.05, 0.00, 0.00, 0.10], | + | [0.10, 0.10, -0.10, -0.05], |
| - | [0.10, -0.10, -0.15, -0.05], # Dec 2023 Havana-like: State-level | + | [0.05, 0.00, -0.05, 0.00], |
| - | [0.05, -0.05, -0.05, 0.00], | + | [-0.05, 0.00, 0.00, 0.10], |
| - | [0.10, 0.05, -0.10, 0.05], | + | [0.10, -0.10, -0.15, -0.05], |
| - | [0.05, 0.10, -0.05, 0.00], | + | [0.10, -0.05, -0.10, 0.05], |
| - | [0.10, 0.00, -0.10, -0.05], | + | [0.10, 0.00, -0.05, -0.05], |
| - | [0.10, 0.05, -0.05, 0.10], # | + | [0.05, -0.05, -0.05, 0.00], |
| - | [0.15, -0.15, -0.20, -0.10], # Sep 2025 Expert: Corroboration | + | [0.10, 0.05, -0.10, |
| - | [0.10, -0.05, -0.10, 0.05], | + | [0.10, -0.05, -0.10, 0.00], |
| - | [0.10, -0.10, -0.15, -0.10], # Nov 2025 Carrier: Impossible physics | + | [0.10, -0.10, -0.15, -0.05], |
| - | [0.05, -0.05, -0.05, 0.10] # Dec 2025 FOIA vanish: Bureaucratic | + | [0.05, 0.10, -0.05, 0.00], |
| + | [0.10, 0.00, -0.10, -0.05], | ||
| + | [0.10, 0.05, -0.10, -0.05], # | ||
| + | [0.10, | ||
| + | [0.15, -0.15, -0.20, -0.10], | ||
| + | [0.10, 0.05, -0.05, | ||
| + | [0.10, 0.00, -0.10, -0.05], | ||
| + | [0.10, -0.05, -0.10, 0.05], | ||
| + | [0.10, -0.10, -0.15, -0.10], | ||
| + | [0.05, -0.05, -0.05, 0.10], # Dec 2025 Vanished | ||
| + | [0.10, -0.05, -0.10, -0.05], | ||
| + | [0.10, 0.05, -0.10, -0.05], | ||
| + | [0.10, -0.05, -0.10, 0.05] # Dec 2025 RDI Refusal: Official threat | ||
| ] | ] | ||
| # Compute adjusted p for each event and hypothesis | # Compute adjusted p for each event and hypothesis | ||
| p_matrix = np.zeros((n_events, | p_matrix = np.zeros((n_events, | ||
| + | p_base_list = [p1_base, p2_base, p3_base, p4_base] | ||
| for k in range(n_events): | for k in range(n_events): | ||
| for i in range(4): | for i in range(4): | ||
| p_matrix[k, i] = np.clip(p_base_list[i] + adjustments[k][i], | p_matrix[k, i] = np.clip(p_base_list[i] + adjustments[k][i], | ||
| - | # Assuming all events observed (successes=13 for each, but per-model fit) | + | # Log marginal likelihood: sum log P(e_k | H_i) |
| - | # Log marginal likelihood: sum log P(e_k | H_i) ≈ n * log(p_i_avg) for binomial, but event-wise product | + | log_liks = np.sum(np.log(p_matrix), |
| - | log_liks = np.sum(np.log(p_matrix), | + | |
| # Priors | # Priors | ||
| Line 200: | Line 332: | ||
| </ | </ | ||
| - | **Analysis Output** | + | ==== Analysis Output |
| - | * Log Marginal Likelihoods: | + | Log Marginal Likelihoods: |
| - | * Posterior Probabilities: | + | |
| - | * Bayes Factors vs H3: [H₁: 10^8.9, H₂: 10^5.7, H₄: 10^7.3] (strong evidence against H₃). | + | |
| - | **Derivation** | + | Posterior Probabilities: |
| - | Each {{:screenshot_2025-12-06_at_19.08.43.png? | + | Bayes Factors vs H3: [H₁: 10^33.5, H₂: 10^23.1, H₄: 10^27.8] (overwhelming evidence against H₃). |
| - | **Posterior Results and Interpretation** | + | ==== Derivation ==== |
| - | The posteriors decisively favour H₁ (62.3% probability), with H₄ (28.9%) as runner-up, H₂ marginal | + | Each (clipped Bernoulli parameter), so . Log-sum avoids underflow; exponentiation yields marginals. Binomial approximation with k=n (all “successes” under fit) reinforces via , but event-wise product is exact here. |
| - | Key drivers: | + | ==== Posterior Results and Interpretation ==== |
| + | |||
| + | The posteriors overwhelmingly favour H₁ (99.999% probability), | ||
| * H₁'s high likelihood stems from pattern cohesion (e.g., 2025 cluster: cyber + intercepts + carrier align with adaptive SIGINT, per Frey effect models for RF-audition, | * H₁'s high likelihood stems from pattern cohesion (e.g., 2025 cluster: cyber + intercepts + carrier align with adaptive SIGINT, per Frey effect models for RF-audition, | ||
| - | * H₂'s collapse: Objective markers (e.g., meter desynchrony from breathing, impossible operator-switching via Shannon-Hartley limits on channel capacity) defy psychosomatic baselines (DSM-5 delusion criteria unmet: shared by expert). | + | * H₂'s weakness: Lacks scale for multi-agency feats (AIVD + RAF + UMC). |
| - | * H₃'s viability: Explains ~30% via error cascades (e.g., DICOM corruption as QC failure, per ISO 15189 lapses), but falters on intent. | + | * H₃'s collapse: Objective markers (e.g., meter desynchrony from breathing, impossible operator-switching via Shannon-Hartley limits on channel capacity) defy psychosomatic baselines (DSM-5 delusion criteria unmet: shared by expert). |
| - | * H₄'s weakness: Lacks scale for multi-agency feats (AIVD + RAF + UMC). | + | * H₄'s viability: Explains ~30% via error cascades (e.g., DICOM corruption as QC failure, per ISO 15189 lapses), but falters on intent. |
| - | Bayes factors (Kass & Raftery scale: > | + | Bayes factors (Kass & Raftery scale: > |
| - | ^ Hypothesis ^ Posterior ^ BF vs. H₃ ^ Key Evidential Fit ^ | + | ^ Hypothesis ^ Posterior ^ BF vs. H₃ Key Evidential Fit ^ |
| - | | H₁ | 0.623 | 10 to the power of 8.9 | Adaptive escalation (e.g., post-research intercepts); | + | | H₁ | 0.999994 |
| - | | H₂ | 0.087 | 10 to the power of 5.7 | Opportunistic cyber/ | + | | H₂ | 8.88e-11 |
| - | | H₃ | 0.0011 | (baseline) | Fails objective data (e.g., RF logs, audiometric U-curves beyond age norms). | | + | | H₃ | 4.53e-33 |
| - | | H₄ | 0.289 | 10 to the power of 7.3 | Institutional glitches (e.g., FOIA vanish), but not patterned timing. | | + | | H₄ | 6.19e-6 | 10 to the power of 27.8 | Institutional glitches (e.g., FOIA vanish), but not patterned timing. | |
| - | **Sensitivity Analysis** | + | ==== Sensitivity Analysis |
| - | Varying priors (e.g., P(H₃)=0.90, | + | Varying priors (e.g., P(H₃)=0.90, |
| - | **Conclusion** | + | ==== Conclusion |
| The evidence is conclusive. This analysis, grounded in the evidence' | The evidence is conclusive. This analysis, grounded in the evidence' | ||
| Line 241: | Line 373: | ||
| ===== Campaign Plan ===== | ===== Campaign Plan ===== | ||
| - | {{ :screenshot_2025-12-09_at_04.11.01.png?nolink |}} | + | {{ :banner-campaign-plan.png?nolink |}} |
| **As of 8 December 2025, direct engagement with Dutch police will commence**, laying bare the forensic threads that no longer permit evasion. The intelligence agencies and industrialists, | **As of 8 December 2025, direct engagement with Dutch police will commence**, laying bare the forensic threads that no longer permit evasion. The intelligence agencies and industrialists, | ||
| Line 335: | Line 467: | ||
| To fellow targeted individuals, | To fellow targeted individuals, | ||
| - | In the face of this insidious neurowarfare holocaust—where invisible beams and synthetic signals transform sovereign minds into profit engines for a complicit industrial-state nexus—we stand at a precipice of revelation and reckoning. Through meticulous documentation, | + | In the face of this insidious neurowarfare holocaust—where invisible beams and synthetic signals transform sovereign minds into profit engines for a complicit industrial-state nexus—we stand at a precipice of revelation and reckoning. Through meticulous documentation, |
| + | |||
| + | **Let no victim suffer in silenced isolation**; examine the raw data, join the call for accountability against perpetrators from intelligence agencies to corporate enablers, and forge a future where human cognition remains inviolate. The darkness yields only to unflinching light—act now, verify relentlessly, | ||
| ---- | ---- | ||
| Line 348: | Line 482: | ||
| All data courtesy of: | All data courtesy of: | ||
| + | |||
| + | {{: | ||
| * Daniel R. Azulay | * Daniel R. Azulay | ||
| Line 356: | Line 492: | ||
| {{counter|total| person visited this page.| people visited this page.}} | {{counter|total| person visited this page.| people visited this page.}} | ||
| - | |||
| - | 10 most visited pages: | ||
| - | |||
| - | {{POPULAR 10 allperiod}} | ||