Subject: Formal Notice Regarding False Claims and Fabricated V2K Evidence
Dear Ms. Holem,
This letter is written as a formal notice and challenge regarding your repeated public claims that voice-to-skull (V2K) signals can be recorded using a standard microphone and processed in Audacity. As a certified TSCM professional and signal analyst, I have reviewed your methodology, your terminology, and your promoted services in detail — and the conclusion is clear:
What you are selling is fraudulent.
🚫 Microphones Cannot Record the Frey Effect
You claim to detect and record V2K attacks using a microphone and software like Audacity — sometimes charging thousands of dollars for “forensic reports” based on this method. But the Frey effect is:
- Non-acoustic and occurs inside the skull
- Caused by pulsed microwave radiation
- Does not produce sound waves in the air
This means a microphone cannot record it — because there is nothing in the air to detect.
Unless you are using a microwave receiver capable of identifying pulsed RF signals prior to biological interaction, your claims of “capturing V2K voices” are scientifically impossible.
🔍 Your Process is Deceptive
Your use of Audacity and similar tools to “extract hidden voices” relies on:
- Amplifying background hiss and static
- Inserting edited or artificial sounds
- Mislabeling environmental noise as “carrier waves”
You use buzzwords like “audio forensics” and “carrier analysis,” but your techniques do not meet any standard of forensic integrity. You provide:
- No signal classification
- No RF measurements
- No waterfall analysis or IQ data
- No peer-reviewed methodology
This is audio pareidolia, not science.
💡 The Truth is Easy to Test — and Falsifies Your Claims
Anyone with a basic microphone and a free copy of Audacity can follow your method — and find nothing. There is no carrier wave. No decoded message. No voice. Just normal room noise and microphone artifacts.
If your method was real, it would be instantly and globally reproducible. It is not — because it is fabricated.
🧾 A Call for Transparency — and Accountability
If you believe your reports are genuine, I am formally requesting that you provide:
- Your full forensic methodology
- Raw unedited audio data
- RF-based signal traces, if any
- Technical justification for how a microphone detects a signal that produces no air pressure wave
If you fail to provide this, and continue selling these reports, you may be in violation of consumer protection and fraud statutes.
⚖️ Legal Reminder
Critiques of pseudoscientific methods — especially those involving paid services — are protected under the First Amendment when grounded in fact, science, and professional credentials. Any attempt to silence critics or threaten legal retaliation for exposing false claims will be met with full documentation and escalation.
✋ Final Warning
If you continue to:
- Sell fake V2K reports
- Use audio editing to fabricate “proof”
- Exploit vulnerable individuals for profit
…then I will continue to publicly debunk your methods, expose your tactics in professional and public channels, and urge others to pursue appropriate legal remedies.
Victims of electronic harassment deserve truth, not exploitation.
Sincerely,
##########
Licensed TSCM Professional
CyberTorture.com Contributor
“Science is not silenced by threats — it is sharpened by scrutiny.”