SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

CREATE AN ACCOUNT FORGOT YOUR PASSWORD?

FORGOT YOUR DETAILS?

AAH, WAIT, I REMEMBER NOW!

CREATE ACCOUNT

ALREADY HAVE AN ACCOUNT?
A global alliance against cyber torture and state-sponsored terror—united, informed, and ready to fight back.
  • LOGIN

Cyber Torture

  • Tech
    • Neuro Signal Intelligence
    • Devices, Hardware & Reviews
    • TSCM & Threat Detection
    • Tools & Special Equipment
    • Spectrum Analysis
    • Experimental & DIY Projects
    • Neurotechnology & Brain Interaction
    • Signal Intelligence & Detection Techniques
    • RF Fundamentals
  • Community Protection
    • Warnings
    • Debunked
    • FCC Reporting Templates
    • Legal Complaint Forms
    • Regulatory Complaint Guides
    • TI Technical Defense
  • Legal
  • Survival
  • Victims
  • Evidence
  • Intelligence
  • Security
    • Cyber Security
    • Physical Security
  • Media
  • Forum
  • No products in cart.
  • Home
  • Community Protection
  • Debunked
  • Letter Sent to Amy Holem

Letter Sent to Amy Holem

0
cybertortureinfo@proton.me
Sunday, 01 June 2025 / Published in Debunked

Letter Sent to Amy Holem

Spread the love

Subject: Formal Notice Regarding False Claims and Fabricated V2K Evidence

Dear Ms. Holem,

This letter is written as a formal notice and challenge regarding your repeated public claims that voice-to-skull (V2K) signals can be recorded using a standard microphone and processed in Audacity. As a certified TSCM professional and signal analyst, I have reviewed your methodology, your terminology, and your promoted services in detail — and the conclusion is clear:

What you are selling is fraudulent.


🚫 Microphones Cannot Record the Frey Effect

You claim to detect and record V2K attacks using a microphone and software like Audacity — sometimes charging thousands of dollars for “forensic reports” based on this method. But the Frey effect is:

  • Non-acoustic and occurs inside the skull
  • Caused by pulsed microwave radiation
  • Does not produce sound waves in the air

This means a microphone cannot record it — because there is nothing in the air to detect.

Unless you are using a microwave receiver capable of identifying pulsed RF signals prior to biological interaction, your claims of “capturing V2K voices” are scientifically impossible.


🔍 Your Process is Deceptive

Your use of Audacity and similar tools to “extract hidden voices” relies on:

  • Amplifying background hiss and static
  • Inserting edited or artificial sounds
  • Mislabeling environmental noise as “carrier waves”

You use buzzwords like “audio forensics” and “carrier analysis,” but your techniques do not meet any standard of forensic integrity. You provide:

  • No signal classification
  • No RF measurements
  • No waterfall analysis or IQ data
  • No peer-reviewed methodology

This is audio pareidolia, not science.


💡 The Truth is Easy to Test — and Falsifies Your Claims

Anyone with a basic microphone and a free copy of Audacity can follow your method — and find nothing. There is no carrier wave. No decoded message. No voice. Just normal room noise and microphone artifacts.

If your method was real, it would be instantly and globally reproducible. It is not — because it is fabricated.


🧾 A Call for Transparency — and Accountability

If you believe your reports are genuine, I am formally requesting that you provide:

  1. Your full forensic methodology
  2. Raw unedited audio data
  3. RF-based signal traces, if any
  4. Technical justification for how a microphone detects a signal that produces no air pressure wave

If you fail to provide this, and continue selling these reports, you may be in violation of consumer protection and fraud statutes.


⚖️ Legal Reminder

Critiques of pseudoscientific methods — especially those involving paid services — are protected under the First Amendment when grounded in fact, science, and professional credentials. Any attempt to silence critics or threaten legal retaliation for exposing false claims will be met with full documentation and escalation.


✋ Final Warning

If you continue to:

  • Sell fake V2K reports
  • Use audio editing to fabricate “proof”
  • Exploit vulnerable individuals for profit

…then I will continue to publicly debunk your methods, expose your tactics in professional and public channels, and urge others to pursue appropriate legal remedies.

Victims of electronic harassment deserve truth, not exploitation.

Sincerely,
##########
Licensed TSCM Professional
CyberTorture.com Contributor

“Science is not silenced by threats — it is sharpened by scrutiny.”

What you can read next

Grounding Doesn’t Help
The Scalar Hoax
EMP Scam

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Cybertorture.com is Launching a Legal Case
  • Dr Hoffers Diagnostic Testing Protocol
  • Dr Hoffer
  • When Truth Is Silenced
  • Proving What Parts of the Head Are Being Targeted by RF

Recent Comments

  1. William rae/kilpatrick on Dr Hoffers Diagnostic Testing Protocol
  2. cybertortureinfo@proton.me on Synthetic Telepathy & Signal Intelligence Toolkit
  3. Maurice Parker on Synthetic Telepathy & Signal Intelligence Toolkit
  4. 0xl0r3nz0 on DIY Non-Linear Junction Detector (NLJD) for Nanotech Detection
  5. cybertortureinfo@proton.me on Only Way Forward is The Necessity Clause

Recent Posts

  • Cybertorture.com is Launching a Legal Case

    Spread the love⚖️ Launching a Legal Case: Pre-E...
  • Dr Hoffers Diagnostic Testing Protocol

    Spread the loveComprehensive Diagnostic Testing...
  • Dr Hoffer

    Spread the loveDr. Michael Hoffer’s Work on Dia...
  • When Truth Is Silenced

    Spread the love🚨 When Truth Is Silenced: Breaki...
  • Proving What Parts of the Head Are Being Targeted by RF

    Spread the love🧠 Detecting Neuroweapon Attacks:...

Recent Comments

  • William rae/kilpatrick on Dr Hoffers Diagnostic Testing Protocol
  • cybertortureinfo@proton.me on Synthetic Telepathy & Signal Intelligence Toolkit
  • Maurice Parker on Synthetic Telepathy & Signal Intelligence Toolkit
  • 0xl0r3nz0 on DIY Non-Linear Junction Detector (NLJD) for Nanotech Detection
  • cybertortureinfo@proton.me on Only Way Forward is The Necessity Clause

Archives

  • June 2025
  • May 2025
  • April 2025

Categories

  • Cyber Security
  • Debunked
  • Devices, Hardware & Reviews
  • Evidence
  • Experimental & DIY Projects
  • Intelligence
  • Legal
  • Legal Complaint Forms
  • Media
  • Neuro Signal Intelligence
  • Neurotechnology & Brain Interaction
  • Physical Security
  • RF Fundamentals
  • Signal Intelligence & Detection Techniques
  • Spectrum Analysis
  • Survival
  • Tech
  • TI Technical Defense
  • Tools & Special Equipment
  • TSCM & Threat Detection
  • Victims
  • Warnings

SIGN UP TO OUR NEWSLETTER

Subscribe to our newsletter and receive our latest news straight to your inbox.

SOCIAL MEDIA

TOP