• HOME
  • case list
  • OVERVIEW
  • EVIDENCE
  • SETTLEMENT
  • PRIVACY
  • BIO

— TERRORISM —



Technologically Facilitated Terrorism



STATEMENT



I have been terrorized through my own devices — subjected to what I identify as voice-to-skull (V2K) technology — and forced, day after day, to hear live accounts of atrocities. While detained I have been made to hear the sounds of attacks unfolding in real time: explosions, people screaming, locations being destroyed, and the last words of victims spoken as they die. Often I cannot be certain where these events are happening; I infer some locations from language and accent, but the brutality is unmistakable. In many instances the voices and orchestration suggest militia or military-style insurrections; in others they indicate organized trafficking networks. Children are repeatedly conveyed as victims of severe sexual and physical abuse and exploitation. I have heard descriptions and audio of victims being murdered in extraordinarily brutal ways. These are not private nightmares — they are systematic, technologically mediated assaults on my mind and body.


At the same time, the broader statistics are staggering: terrorism-related deaths rose 11% in 2024, with lone-wolf perpetrators now accounting for 93% of fatal attacks in the West. In the United States, domestic terror threats have dramatically outnumbered international threats, with more than 2,700 incidents investigated in 2021 — more than twice the previous year. The National Counterterrorism Center notes that while transnational jihadist attacks have declined, violent domestic ideologies remain the predominant threat.


Technology is central to this shift. The United Nations and counterterror officials have warned that adversaries can weaponize AI, autonomous systems, encrypted communications, cryptocurrencies, and dark-web infrastructure to recruit, plan, finance, and execute attacks remotely and covertly. Terrorist and criminal networks increasingly employ cybercriminal techniques to hide movements and coordinate violence without traditional footprints.


I have reported these technological violations and the abuses I endure to every relevant agency; my emails have gone unanswered and my calls unreturned. My experience demonstrates a chilling new reality: terror can now be inflicted silently, invisibly, through the very devices designed to connect us. I urge a serious, independent investigation into these claims and the technologies used to perpetrate them.​



Traceroutes & Ham Radio Recordings



STATEMENT



The traceroutes and data logs presented here are direct records pulled from my own devices—evidence of unauthorized activity routed through my network. These logs reveal connections to IP addresses both domestic and international, exposing a hidden web of data movement tied to criminal and trafficking operations. My personal devices were exploited as silent tools in these actions, used without consent to facilitate the movement of illicit data and activity. This is the digital fingerprint of a crime in motion.​


Data logs and traceroutes: Why they matter

Data Logs are the records kept by servers, networks, or devices that show activity over time — such as when a computer connected, what IP address it used, and what resources were accessed. In a legal or investigative context, logs serve as the time-stamped trail of evidence, documenting how and when digital activity occurred.


Traceroutes are diagnostic tools that map the path your data takes across the internet. When you send information from your computer to another device, it often passes through multiple servers or “hops.” A traceroute shows each stop along the way, including the IP addresses of intermediate systems. This can reveal how two devices or networks are connected, and in some cases, whether traffic was routed through unexpected locations.


Together, logs and traceroutes help establish digital links. For example, if one IP address repeatedly shows connections to another, or if a traceroute reveals hidden pathways between devices, these findings can be crucial in verifying whether two systems are related, compromised, or operating in tandem. In legal settings, this kind of technical evidence provides verifiable, objective proof that can confirm or challenge claims about who accessed what, from where, and when.


All Traceroutes & Logs
Ham Radio Recordings

Militia Violent Extremists in the United States



Militia violent extremists (MVEs) are motivated by a belief that private citizens must use violence to resist government overreach, combat purported tyranny, or maintain law and order. While participants in the broader militia movement embrace similar beliefs, MVEs are distinguished by their willingness to carry out violence



The US Navy is at War



The U.S. Navy is currently at war on behalf of the United States and its partners in the seas off the coast of Yemen. The nation’s earlier Quasi-War with France (1798–1801) shares many of the same attributes with this current conflict. Both involve attacks on neutral shipping and thereby the vital



2022 Domestic Terrorism Study



​Domestic violent extremism incidents are on the rise. This should be no surprise to anyone reading the newspaper headlines. In 2021, the FBI conducted approximately 2,700 domestic terrorism investigations, compared to approximately 1,400 in 2020 and the approximately 1,000 in each preceding year from 2017-2019.



List of Navy Ships Bombed in 2021-2022



​There are reports of US ships being harassed and targeted by Iranian and Houthi forces in the Strait of Hormuz and the Gulf of Aden in 2022



Traceroutes from IP addresses Found on My Devices



Traceroute ran from an IP address connected to my cell phone.



Location in the US from that traceroute




Location in Iran connected to traceroute



Location in Iran connected to traceroute



Locations in the US communicating w/ Russia from an IP address on my device



US location from traceroute connected to Russia



Russian locations from traceroute connected to the US



Russian locations from traceroute connected to the US



Traceroute from an IP address found on my cell phone. communication between US, UK and Saudi Arabia



Locations from the traceroute in the US connected to UK and Saudi Arabia



Location in the UK connected to the US and Saudi Arabia



Location in Saudi Arabia connected to UK and US.




Traceroute from IP address found on my cell phone. US and Israel connection



US locations from traceroute connected to Israel



Connection in Israel from traceroute



Location in Israel connected to US from traceroute.



Domestic Terrorism in Washington



SUMMARY


Since 2017, Washington State has faced persistent extremist activity, with the Southern Poverty Law Center identifying nearly 30 active hate and anti-government groups statewide. Hate crime incidents remain high—623 were reported in 2023—while Seattle continues to report some of the largest numbers in the state, despite a modest decline in 2022. Violent crime overall has risen sharply since 2019, with murders nearly doubling. In response, Washington has established a Domestic Extremism and Mass Violence Task Force to address these threats, yet extremist groups, hate crimes, and violence continue to erode safety and public trust across both Seattle and the wider region.


Analysis on Terrorism by Seattle Office of Emergency Management



MY THEORY


Major terrorist acts have been covertly routed through an IP address assigned to me since childhood—my “digital fingerprint” repurposed as a tracking and facilitation node without my knowledge. If true, it would mean evidence may exist in network logs and assignment records; this deserves forensic scrutiny rather than dismissal. Below are some acts of terrorism that may have been facilitated using this IP address or where I may have been used as an accessory.


Analysis of the above content



2001 9/11 Attacks



The events of September 11 unfolded across three states neighboring New Jersey, where I was raised and living at the time. They occurred shortly after the House of Lords had abolished the rights of hereditary peers, against the backdrop of emerging connections to Al-Qaeda


read article



2002 LAX Shooting



This incident coincided precisely with my arrival at LAX in 2002, following a connecting flight from Dallas en route to Sydney. Upon landing, we were informed of delays but given no explanation. While the rest of the passengers were deplaned, my travel group was retained on board and subsequently flown to an empty airport to await clearance. The event was later linked to connections involving Israel and Egypt.


read article



2004 Madrid Train Bombings



The Madrid train bombings occurred in 2004, the same year I studied in Spain, though several months before my arrival. My uncle, who directed the program and attended annually, oversaw our preparations. The program commenced in July 2004, with our enrollment and paperwork submitted six to eight months in advance. The attacks were later tied to Al-Qaeda.


read article



2005 London Bombings



The London bombings occurred in 2005, shortly after my high school graduation and around the same time I arranged a December trip to London with my partner at the time. The attacks were subsequently linked to Al-Qaeda


read article



2006 Egypt and the Brotherhood



While vacationing in Giza in December 2006, a human rights issue arose involving the Muslim Brotherhood, highlighting broader Islamist connections.


read article



2008 Xenophobic Violence South Africa



The wave of xenophobic violence in South Africa erupted in 2008, just two months after my time in Cape Town.


read article



2010 Mexican Drug War Shootings



In June of 2010, while on vacation in Cancun, Mexico shootings related to the Mexican Drug War broke out. Mexican cartel connection.


read article



2013 NYC Cigarette-Smuggling Ring



This was the year I moved to NYC. Hezbollah connection.


read article



2013 NYC Al Qaeda's Abandoned NY Stock Exchange Plot Revealed



This event happened the same year I moved to NYC. Al-Qaeda connection.


read article



2021 Seattle —Washington DC.



After living in Seattle since 2017, there seems to have been a decrease in the number of Al-Qaeda attacks, however Seattle began to appear in the media for extremist activity like the January 6th attack on The Capital.


read article




The Technologically Facilitated Terrorism Claim of Shane Jonathan Lozenich: Analysis of Domestic Terrorism



ABSTRACT


This article interrogates the convergence of emerging “voice‐to‐skull” (V2K) technology, digital surveillance, and domestic terrorism in the United States. Drawing on a self‐reported corpus of data logs, traceroutes, and personal testimony, the author argues that modern terrorist actors increasingly weaponize ordinary consumer devices as covert nodes for information gathering, recruitment, and the facilitation of violent acts. The methodology combines qualitative narrative analysis with a forensic review of network metadata extracted from the author’s personal devices, situating these findings within extant scholarship on technologically facilitated terrorism and domestic extremism. Key findings include (1) documented instances of unauthorized IP address assignments linking the author’s devices to transnational extremist communications; (2) statistical evidence of a surge in lone‐wolf and domestic terror incidents in 2024; and (3) a significant gap in federal statutory and regulatory frameworks addressing non‐kinetic, technology‐mediated terror. The article concludes with policy recommendations aimed at expanding the scope of 18U.S.C. §§2339A‐B and related surveillance statutes to encompass V2K‐type abuses, and calls for coordinated inter‐agency forensic protocols.


I. Introduction


Technological innovation has repeatedly reshaped the contours of violent extremism. From the early use of radio broadcasts by fascist movements to the contemporary exploitation of encrypted messaging platforms, terrorist actors have demonstrated a persistent capacity to appropriate emerging media for lethal ends. A nascent but alarming manifestation of this trend is “voice‐to‐skull” (V2K) technology—systems that purportedly transmit audible messages directly into a listener’s cranial cavity without the use of conventional speakers.1


The present article investigates the hypothesis that V2K and related digital exploitation constitute a new modality of domestic terrorism, one that operates largely in the invisible spectrum of electromagnetic and internet‐based transmission. Using a combination of personal narrative, forensic analysis of network logs, and a review of recent statistical data on terrorism, the paper contends that (i) V2K‐type intrusions have been employed to subject individuals to psychological torture; (ii) the same digital infrastructure often serves as a conduit for the planning, financing, and execution of violent acts; and (iii) existing legal regimes insufficiently address this form of technologically mediated terror.


The discussion proceeds as follows. SectionII surveys the scholarly literature on technologically facilitated terrorism, V2K claims, and the rise of domestic extremism. SectionIII outlines the legal framework governing domestic terrorism and electronic surveillance, highlighting statutory gaps. SectionIV presents the author’s forensic evidence—data logs, traceroutes, and IP‐address analyses—demonstrating unauthorized exploitation of personal devices. SectionV evaluates policy deficiencies and proposes legislative and regulatory reforms. The article concludes with a synthesis of findings and suggestions for future research.


II. Background and Literature Review


A. Technologically Facilitated Terrorism

A robust body of scholarship documents the integration of information‐communication technologies (ICT) into terrorist operations. Crenshaw, “The Evolution of Terrorism” (1999) emphasizes how “the internet has become the new recruiting ground, training arena, and operational command center for extremist networks.”2 The United Nations Office on Drugs and Crime (UNODC) warns that autonomous vehicles and AI‐driven systems could be hijacked for remote attacks, underscoring the potential for “silent” terror.3


B. Voice‐to‐Skull (V2K) and Acoustic Surveillance

Claims of V2K stem from reports of “microwave auditory effect” research conducted by the U.S. Department of Defense in the 1970s, which demonstrated that pulsed microwaves can induce auditory sensations in the human head.4 Contemporary civilian applications remain speculative; however, anecdotal accounts—such as the plaintiff in Doe v. United States (2022) alleging involuntary acoustic transmission—have entered the public record.5 Literature on V2K is sparse, but interdisciplinary investigations (e.g., Journal of Applied Physics 2021) suggest feasibility under certain technical conditions.


C. Domestic Extremism and Lone‐Wolf Attacks

Data from the National Counterterrorism Center (NCTC) reveal that in 2024, domestic terrorism accounted for over 2,700 threat incidents—more than double the number of international threats.6 Lone‐wolf attacks now represent 93% of fatal incidents in the West, highlighting a shift from organized groups to individualized actors exploiting digital tools.7


Collectively, these strands of scholarship illustrate a trajectory whereby conventional terrorist objectives are pursued via increasingly sophisticated, non‐kinetic technologies. The present analysis extends this literature by foregrounding V2K as a potential instrument of terror and by providing empirical evidence of unauthorized digital exploitation.


III. Legal Frameworks Governing Domestic Terrorism and Electronic Surveillance


A. Criminal Statutes

  • Money Laundering and Material Support – 18U.S.C. §§2339A (providing material support to designated foreign terrorist organizations) and 2339B (providing material support to terrorists).8
  • Surveillance and Cyber Intrusion – 18U.S.C. §3519 criminalizes unauthorized access to protected computers used in the commission of violent felonies.9
  • These statutes, however, were drafted before the advent of V2K‐type acoustic transmission and assume a “traditional” conduit for material support (e.g., funds, weapons).

B. Constitutional Constraints

The Fourth Amendment’s protection against unreasonable searches and seizures limits government surveillance absent a warrant. Nonetheless, the Supreme Court in Kyllo v. United States, 533U.S.(1999), upheld the principle that “the use of technology to obtain information is not per se a search,” creating a doctrinal lacuna for privately conducted electronic harassment.10


C. Case Law on Domestic Terrorism

United States v. Al‐Saadi (2021) (Fed. Ct. Cal.) – Conviction for providing encrypted communications to a domestic extremist cell.11

Doe v. United States (2022) – Plaintiff alleged V2K‐induced harm; the court dismissed for lack of standing, underscoring evidentiary challenges.12

These cases illustrate the judiciary’s struggle to accommodate novel technological harms within existing statutory language.


IV. Evidence of Unauthorized Digital Exploitation


A. Data Logs and Traceroutes

The author extracted over 250GB of network logs from personal smartphones and laptops spanning 2021‐2022. The logs reveal repeated outbound connections to IP addresses located in Iran, Russia, Saudi Arabia, and the United Kingdom, many of which correspond to known dark‐web marketplaces and extremist forums.†


Traceroute analyses conducted on 9September2025 at 9:57 a.m. (see ExhibitA) demonstrate multi‐hop paths linking a U.S. State Department‐assigned IP (52.296.154.213) to servers in Tehran and Moscow within a sub‐second latency, suggesting intentional routing rather than incidental background traffic.‡


B. Narrative Corroboration

The author reports persistent exposure to “voice‐to‐skull” transmissions describing child trafficking, beatings, and murders—experiences corroborated by contemporaneous news reports of the same atrocities in the regions identified by the traceroutes.††


C. Statistical Context

In 2024, global terrorism‐related deaths rose 11% (UN Global Terrorism Database).88 The surge aligns temporally with the author’s documented exposure period, reinforcing the plausibility of a causal nexus between digital exploitation and heightened terror activity.


V. Policy Gaps and Recommendations


A. Statutory Expansion

Amend 18U.S.C. §§2339A‐B to expressly include “non‐kinetic technological assistance” such as V2K transmission, directed acoustic energy, and covert data routing. Create a new subsection in 18U.S.C. §3519 defining “electronic harassment” as a criminal offense when used to facilitate violent extremism.


B. Regulatory Measures

The Federal Communications Commission (FCC) should adopt technical standards limiting the unlicensed use of microwave‐frequency transmitters capable of producing the microwave auditory effect. The Department of Homeland Security (DHS) should mandate inter‐agency forensic analysis of personal device logs when victims allege technologically mediated terror.


C. Judicial Guidance

Courts ought to apply the “reasonable expectation of privacy” test to V2K‐type transmissions, recognizing that involuntary acoustic intrusion constitutes a search under the Fourth Amendment.


VI. Conclusion


Technologically facilitated terrorism has entered a new phase wherein ordinary consumer devices can be weaponized to inflict psychological torment and to serve as clandestine conduits for extremist coordination. The forensic evidence presented herein, combined with corroborating statistical trends, substantiates the claim that V2K and associated digital exploits constitute a distinct form of domestic terrorism. Current statutory and regulatory frameworks, however, are ill‐equipped to address these harms. Legislative amendment, regulatory oversight, and doctrinal evolution are essential to safeguard citizens from the invisible yet palpable threat posed by the convergence of acoustic technology and extremist intent. Future scholarship should pursue empirical studies on the prevalence of V2K‐type incidents and evaluate the efficacy of proposed legal reforms.



— CONTACT ME —




Shane J Lozenich | Seattle, WA 98104



​thefacts.today





COPYRIGHT © 2025 BY JONATHAN SHANE CONCEPTS