Origin and Concealment of the Technology
For decades, states and high-level intelligence structures have invested in invisible technologies designed to penetrate the core of the human mind without physical contact. Developed in military laboratories and funded through budgets hidden under defense and scientific research programs, these projects were officially presented as advanced communication systems, neurological studies, or tools to control mental disorders. In reality, they were silent weapons built to dominate thought, manipulate perception, and destroy individual autonomy. The public was never informed of their existence. Military documents remain classified at the highest level, far from public reach. Published patents and technical reports are written in deliberately confusing, fragmented language, wrapped in harmless scientific terminology, so that even isolated experts cannot grasp the full system. Each document describes only a portion of the technology, preventing outsiders from reconstructing its complete function. This means that as long as these documents remain locked away and inaccessible to the public, there will never be official evidence—and that absence is intentional. The concealment was not accidental; it was a strategic decision to ensure that when the technology was applied to civilians, they would have no reference to identify the attack.
Voice to Skull (V2K) and Remote Neural Monitoring (RNM) are two faces of the same weapon: one projects voices and commands directly into the target’s auditory perception, the other reads and maps the brain in real time, creating an invisible, bidirectional channel of manipulation.
My goal is to translate this complex technology into terms that anyone, regardless of technical knowledge, can understand. No jargon, no filters, no softening the impact of what is being said. V2K (Voice to Skull) and RNM (Remote Neural Monitoring) are the names now associated with decades of secret research in neuroscience applied to warfare. These are active systems, running continuously, used for remote surveillance, manipulation of mental states, induction of false psychiatric symptoms, and total control of the target. This is not theory—it is operational military technology, deployed silently, leaving no physical trace, and capable of destroying a person without any direct physical intervention.
V2K — The Invisible Auditory Channel
V2K, Voice to Skull, is a military technology designed to transmit sound directly into human auditory perception—either through the internal auditory system or by directly stimulating the brain areas responsible for sound processing—without speakers, headphones, or any visible physical device. This is not hallucination or mental illness—it is a signal emitted remotely, converted into clear sound perception by the target’s own brain. Transmission is continuous, active 24/7, without interruption, and does not rely on cell networks, the internet, or conventional satellites. It works anywhere: underwater, inside caves, within shielded buildings, underground areas, and even during flight. In enclosed, isolated environments such as tunnels, metal chambers, or caves, intensity tends to increase and voices become clearer.
Sound may be perceived as coming from inside the head or from specific points in the environment, such as walls, pipes, fans, ventilation systems, or household appliances. This simulation of a physical source is intentional—designed to create confusion and make the target believe the voices come from neighbors, relatives, or nearby people. Often, familiar voices are imitated with precision, replicating the tone and mannerisms of family members, friends, or authority figures. In many cases, the voices comment on private information only the target knows, reinforcing the sense of constant surveillance and mental intrusion. When the target is near fans, ventilation systems, or devices like air conditioners, the voices often intensify due to EEG heterodyning—an effect that amplifies induced sound perception. Even while listening to music with headphones, the interference does not disappear. If the active program is designed for psychological harassment, the system mixes hostile audio with the music, maintaining permanent auditory bullying. If the goal is different—such as emotional manipulation, conditioning, or specific commands—the content is adapted to the active program but still overrides the sound the victim is trying to hear.
Over the decades, this technology has been given different names and labels, each used in specific contexts. Voice to Skull (V2K) – the most popular name among whistleblower communities. Voice of God – used in military psychological operations to simulate “divine” messages. Voice of Allah – a cultural variation used in Middle Eastern contexts. Synthetic Telepathy – voice or thought communication sent directly to the brain. Frey Effect – phenomenon discovered by Allan H. Frey: auditory perception caused by pulsed microwaves. Ultrasonic Silent Messaging – messages sent via ultrasound beyond normal hearing range. Direct Brain-to-Speech Transmission – direct linking of signals to the brain’s auditory area. Silent Talk – used in DARPA projects for soldier-to-soldier communication without audible sound. Microwave Auditory Effect – scientific term for the Frey Effect in technical reports. Silent Sound Spread Spectrum (SSSS) – subliminal transmission via modulated frequencies. Remote Microwave Hearing – remote auditory perception induced by microwaves. Neuro Voice or Neural Voice Transmission – “high-tech” labels used in patents. Ultrasonic Heterodyning – technique combining frequencies to create audible voice only at the reception point. Bone Conduction Messaging – transmitting sound through bone vibration without using the outer ear. Despite the variations, all describe the same capability: inserting sound or voice directly into auditory perception invisibly and without detection.
Sound quality can range from crystal clear to distorted, depending on equipment and programming. It can be layered, with multiple overlapping voices to cause mental confusion, or alternate between extreme clarity and indistinct noise to create anxiety and frustration. Beyond voice, V2K can insert fake environmental sounds—footsteps, knocks, high-pitched tones, screams, threats—that seem to come from the physical space around the target. These sounds are used to increase stress, create a constant threat atmosphere, and deprive the victim of mental rest. Perception of time and space can also be manipulated—V2K can make sounds seem closer or farther than they are, creating the sensation of moving pursuit, as if the voices follow the target.
Transmissions follow psychological scripts tailored to the target’s profile, chosen based on vulnerability and cultural context. A religious target may receive messages from “gods,” “angels,” or “demons.” Targets with fear of the paranormal may hear voices or sounds mimicking supernatural experiences. Others may be exposed to extraterrestrial references, insults, personal humiliation, or incitement to violence. In extreme cases, scripts are used to induce dangerous behaviors, including self-harm or aggression toward others. But for these transmissions to be fully effective, a second component is needed—the ability to read the target’s mind in real time, to know their thoughts and reactions before they occur. This is the role of RNM—Remote Neural Monitoring—which we will look at next.
RNM — Remote Brain Reading and Mapping
Remote Neural Monitoring (RNM) is the brain-reading and mapping component of this invisible weapon. If V2K is the input channel—the projection of sound or voice directly into auditory perception—RNM is the output channel, capturing the target’s neural activity in real time. It functions as an invisible, remote brain-computer interface, where every electrical signal generated by the nervous system is detected, decoded, and stored. No implants, physical sensors, or direct contact are required: the reading is carried out remotely through frequencies capable of resonating with the brain’s electrical activity and extracting information in near real time. By reading the visual cortex, the operator sees exactly what the victim sees—receiving on their screen the processed visual feed as if inside the victim’s mind in a first-person shooter (FPS) environment.
The first impact of RNM is the creation of a complete “map” of the target’s mind. This mapping is progressive and occurs in phases: it begins with a superficial reading of brainwave activity—alpha, beta, delta, theta—linking them to basic mental states such as concentration, anxiety, drowsiness, or relaxation. Then the reading deepens, decoding neural patterns associated with specific words, images, sounds, and emotions. With enough data, the system constructs a detailed and interactive model of the victim’s brain, allowing the operator to “navigate” through it like a virtual map, identify and monitor specific areas, and directly stimulate them at will.
That stimulation is not limited to hearing or sight. RNM can activate or suppress specific areas, producing artificial physical sensations: nonexistent touches, skin pressure, localized electric shocks, sudden heat or cold, itching without cause, or sharp pain without real injury. The range extends to chemical senses: false smells and tastes can be induced, from unpleasant odors meant to cause disgust to familiar scents used to create artificial comfort. In extreme cases, it can simulate physical assault by directly stimulating brain regions responsible for tactile and sexual perception, producing a sensation of bodily invasion without physical contact. During sleep, RNM can insert synthetic dreams, manipulating dream content in a controlled way and combining real and artificial elements to shape the target’s perception and memory.
With complete mapping, RNM becomes a tool of total intrusion: it can read thoughts the moment they arise, decode mental images like visual files, and predict emotional reactions before the target is even aware of them. This ability is not passive—it enables targeted attacks, where V2K and RNM work together in a closed loop. RNM captures the thought or emotion, sends it to the system, which immediately returns an auditory or sensory stimulus tailored to manipulate the response.
It is important to distinguish between precision attacks and generic transmissions. Full brain mapping and creation of a neural “clone” are necessary only for ultra-personalized attacks, where the auditory or sensory response is adjusted to the victim’s thoughts in real time. To transmit generic voices or sounds, the system does not require that level of connection—it only needs to emit a calibrated signal to reach brains within a certain area, affecting multiple people simultaneously. This less precise saturation technique is used to create collective confusion, manipulate groups, or test the technology’s range.
RNM can also create artificial realities within the target’s mind, inserting visual hallucinations and nonexistent interactions. For example, someone in the street may see people reacting, pointing, or insulting them when in reality nothing is happening. It can also induce the perception of conversations with individuals who do not physically exist, explaining cases of people talking to themselves in public, convinced they are interacting with someone. All of this is projected directly into visual and auditory processing, creating false, remotely controlled scenarios. The logic is similar to the scene in The Matrix where Morpheus explains to Neo that what we call “real” is actually just a set of electrical signals interpreted by the brain. If those signals are externally controlled, the perception of the world can be completely fabricated.
The victim loses a clear boundary between their own thoughts and external stimuli. Mental privacy ceases to exist. Every reaction, memory, or emotion is captured, recorded, and potentially weaponized. This is how RNM turns the brain into an invisible battlefield, where the enemy is not in physical space but inside the mind, continuously manipulating the nervous system without leaving physical evidence.
Infrastructure and Frequencies Used
V2K and RNM do not rely on satellites or conventional microwaves. Systems like Starlink or satellite TV require direct line of sight and lose signal with dense clouds, storms, or any physical barrier. Microwaves require an unobstructed path and are blocked by trees, buildings, and mountains. V2K maintains continuous operation even in underground, submerged, shielded, and high-altitude aircraft environments—definitively ruling out the use of traditional satellites or microwaves.
The signal used is in the ELF (Extremely Low Frequency, 3–30 Hz) range, capable of penetrating soil, rock, water, and metal with minimal attenuation. This technology has been used for decades by military forces to communicate with submarines thousands of miles away. The low frequency ensures deep penetration and absolute stability, allowing transmission to reach any target in any physical environment.
The power grid acts as the primary conductor, distributing the signal through high- and medium-voltage lines and across the entire energy infrastructure. This system is reinforced by HAARP-type (High-frequency Active Auroral Research Program) low-frequency radiation facilities, which broadcast ELF on a large scale to ensure global coverage and redundancy. Powered through the electrical grid, the signal is continuously present in virtually all inhabited areas of the planet, regardless of internet or mobile network coverage.
The human body acts as a biological antenna, capturing the electromagnetic field through direct coupling. The signal is calibrated to match natural brainwave frequencies—such as alpha and beta waves—and the Schumann resonance (~7.83 Hz), the Earth’s fundamental electromagnetic frequency. This alignment allows direct interaction with neurological processes, making reception inevitable and impossible to block by conventional means.
AI: From Subtle Manipulation to Absolute Mind Control
The technology operates on a scale that ranges from subtle mental manipulation to total mind control. At its lowest level, it functions as mind manipulation, influencing perceptions, emotions, and decisions without fully eliminating the target’s autonomy. At its highest level, it becomes mind control, taking direct command over cognitive and behavioral processes, where every thought, reaction, or impulse can be induced or suppressed remotely. Artificial intelligence ensures that this transition is gradual and tailored to the victim’s psychological profile, making the process virtually invisible.
The daily operation of V2K and RNM is sustained almost entirely by artificial intelligence. More than 90% of interactions do not come from direct human operators, but from automated systems trained to imitate human behavior, adapt scripts, and exploit psychological vulnerabilities. These systems run continuously, analyzing in real time every reaction, emotion, or thought captured by RNM, and instantly adjusting the content transmitted by V2K. There are no breaks, fatigue, or inconsistency: AI maintains constant, precise, and personalized harassment, 24 hours a day.
Machine learning allows the system to learn the victim’s cognitive patterns as if it were a programmer studying source code. Every emotional reaction, hesitation, or recalled memory is indexed and associated with specific responses. This creates a dynamic behavioral profile that is used to predict future responses and choose stimuli that maximize psychological impact. If a particular voice, sound, or phrase provokes fear or irritation, the AI records and repeats that trigger until the target’s emotional resistance is exhausted.
These systems are not limited to repeating threats or insults; they can simulate complex dialogues, switching between virtual characters and false scenarios to create the illusion that multiple people are involved. They can mimic the speech patterns of family members, colleagues, or authority figures, making the intrusion more convincing and harder to identify as artificial. In some cases, they use real information obtained illegally (wiretaps, digital surveillance, recorded conversations) mixed with fabricated elements, creating confusing narratives that undermine the target’s trust in their own memory.
The main objective is not merely to annoy — it is to create artificial mental states that mimic psychiatric disorders. The AI is trained to induce thought and response patterns similar to those seen in schizophrenia, psychosis, or paranoid disorders, but without any biological basis. This serves two purposes: to neutralize the target through mental exhaustion and to provide a cover story in case the victim seeks medical help, leading to them being diagnosed and treated as mentally ill.
Over time, the AI adjusts to maintain effectiveness, introducing new tactics when the victim starts to recognize patterns. This ensures the manipulation never becomes predictable, preventing the target from developing solid psychological resistance. The scale of this operation, being almost fully automated, allows thousands of targets to be managed simultaneously through a centralized system, with minimal direct human intervention. This automation is what makes V2K and RNM so dangerous: they do not depend on individual operators, but on a global infrastructure of surveillance and mental attack, guided by algorithms capable of adapting infinitely.
Objectives, Applications, and Criminal Exploitation
V2K and RNM are used with clear, deliberate objectives: total neurological control, AI training, suppression of opponents, and silent elimination of anyone considered an obstacle. This technology is a perfect weapon for states, intelligence organizations, and clandestine networks—it operates without physical evidence, destroys the victim’s mental autonomy, and when reported, is automatically dismissed as delusion or mental illness. There are no trials, no visible physical operations, no public exposure—neutralization is invisible, although if the target is manipulated into committing murder, judicial reaction is immediate, treating the case as a common crime without revealing the true origin of the manipulation.
Main objective: induce artificial psychosis, forge schizophrenia, program suicides, cause mental collapse, and completely destroy the victim’s social reputation. By fabricating false psychiatric symptoms, operators ensure that any report is discredited, paving the way for social isolation, job loss, estrangement from friends and family, until total life destruction. This process, beyond neutralizing the target, benefits the system itself by feeding the mental health industry—creating artificial “patients” pushed into treatments, hospitalizations, and drug consumption, generating profit and validating psychiatric agendas.
Specific objectives for operators: test the limits of neurological control in humans, measuring how far thoughts, emotions, and behaviors can be manipulated without external detection; induce violent or irrational behavior to justify surveillance, preventive detention, or totalitarian measures under the pretext of public safety; collect data for cognitive AI training, using victims as human test subjects for algorithms that learn to manipulate emotional and cognitive responses in real time; silently eliminate dissidents, journalists, whistleblowers, or political critics, without leaving any physical or digital evidence that could be used in court.
In parallel, the same system is exploited by criminal networks infiltrating the global infrastructure. Corrupt operators sell access for personal revenge, extortion, or financial exploitation. Wealthy and influential individuals pay to have someone inserted into the system, often as retaliation against people they dislike or who have harmed them. With RNM, sensitive personal information, financial secrets, habits, and behavior patterns are collected, then used in schemes to carry out scams, manipulate decisions, force transactions, or blackmail. It is the fusion of total espionage with high-level organized crime, where the victim’s mind becomes the entry point for the attack.
In Portugal and worldwide, there are no laws officially recognizing these military technologies, nor legal mechanisms capable of framing and punishing those responsible. This legal vacuum guarantees absolute impunity, allowing states, intelligence agencies, and private groups to continue using these weapons without any risk of judicial conviction.
The Ongoing Operation and Current Reality
This is not a future threat—it is an ongoing operation. V2K and RNM are already being used against civilians worldwide, right now, at this very moment. Victims are not only political dissidents or high-value strategic targets; they can be neighbors, coworkers, or relatives—chosen out of convenience, personal retaliation, or mere testing opportunity. The myth that these weapons are science fiction is the first level of the system’s protection: as long as the public believes they do not exist, the attack can proceed without opposition. Every day this reality is ignored, more people are silently neutralized, mentally and socially destroyed, while the structures operating them expand their network and improve the efficiency of manipulation.
There are no legal protections, no defense protocols, no transparency. The target is forced to fight an invisible enemy, supported by states, corporations, and criminal networks operating with total impunity. In Lisbon, major hubs of socialization and frequent presence of intelligence organization agents and neural operators include the Lux Frágil nightclub, Lust in Rio, Harbour Music Shelter, and the Old Vic bar—places where these individuals circulate, observe, select targets, and maintain networks of influence and protection.
This is the battlefield of the 21st century—not made of trenches, but of brains. And as long as society keeps looking away, these weapons will continue to be used, refined, and normalized, until the moment when any person can be mentally shut down with a single remote command.
Many will argue that Portugal is a small and poor country, without military or technological projection comparable to the great powers, incapable of sustaining operations at this level. This thinking is naïve and dangerous. Portugal, despite being poor, is a member of the European Union and NATO, which gives it direct access to joint military programs, intelligence sharing, and the use of technological infrastructure that is integrated and interdependent with allied blocs. The agents on Portuguese soil fully understand how these operations work and have operational autonomy to decide targets and methods within the political and strategic directives they serve. Portugal is poor but strategically valuable: the vast majority pays no attention, public questioning is rare, and the State actively collaborates. It is an ideal environment to operate and test without scrutiny — cheap, discreet, and without risk of international scandal.
August 2025
This article is in English. Read the Portuguese version ⇒ Ler em português