• HOME
  • case list
  • OVERVIEW
  • EVIDENCE
  • SETTLEMENT
  • PRIVACY
  • BIO

— VOICE TO SKULL —



My Statement as a Targeted Individual



STATEMENT



​Since 2020, I have been a victim of what is commonly referred to as targeted individual harassment, a form of persecution involving invasive surveillance technologies and psychological torture. It began with voices that mimicked my next-door neighbors—threats spoken aloud, yet without a visible source. The behavior was completely out of character for them, and I never once saw them act aggressively toward me in person. The voices would emerge primarily at night in my bedroom or while I worked in my backyard art studio.


After several months, the original neighbors were suddenly gone. A new couple moved in—but the harassment continued. Along with the ongoing verbal threats, I began experiencing physical pain in my head and body, like vibrations and sharp pains. It became clear that this was not isolated to one location or group of people. The abuse escalated into full-scale surveillance: the perpetrators appear to have access to my senses. They see through my eyes. They hear what I hear. This intrusion is constant—24 hours a day—and available to anyone connected to this networked technology. It is an unspeakable violation of privacy, dignity, and bodily autonomy.


Every day, I feel as though I am being assaulted—psychologically, emotionally, and spiritually. The trauma has been immense. To compound the horror, I am being forced to hear the voices and pleas of others—people who are being trafficked, raped, and, in many cases, murdered. Many of these victims are children, and somehow they are able to communicate with me. Whether this link is intentionally created by the abuser or an emergent feature of the technology, I do not know. What I do know is that it is an evil, perverse game that no one should be subjected to.


This system is not just abuse—it facilitates terrorism. While I was in jail, I was forced to hear what seemed to be real-time attacks: a bus being blown up, experienced from the perspective of someone inside; ships under siege, with the same horrific intimacy. I do not know how many others are being affected by this, but I know I am not alone. I speak because the silence they rely on is what allows them to continue.



RELATED MATERIAL



  • Lance Ridel Blog
  • Help Stop V2K
  • Frederick Banks vs Unknown Named Federal Judges
  • Report from Victim in India
  • Note from the Marines
  • Electronic Terrorism Blog
  • Tim Young Blog
  • Seattle V2K Victim Blog
  • Neetha Josepha Blog


Overall Summary of the Emails Sent by Shane Lozenich (link to emails below)


Emails Reporting V2K
More related to voice to skull

Evidence of Hidden Cameras



This short video captures unusual reflections and focal artifacts in my eye — evidence I believe points to a concealed ocular lens or hidden camera, a phenomenon some associate with 'voice-to-skull' surveillance.



Detection of Microwave Weapons



This video shows my unplugged microwave producing a magnetic field above 300 µT — an alarmingly high reading that shouldn’t exist when the appliance is disconnected.



Voice-to-Skull Torture: An Analysis



ABSTRACT



This paper explores the phenomenon of voice-to-skull (V2K) technology, focusing on the implications of electronic harassment as it pertains to legal definitions of torture and human rights violations. The narrative presented by the subject of this analysis reveals a complex interplay between mental health, legal frameworks, and technological advancements. Drawing from a series of personal accounts from individuals who claim to be victims of V2K, the paper seeks to examine the efficacy of current legal protections against such violations.



INTRODUCTION



The advent of advanced technology has introduced unprecedented forms of psychological torture, notably through the alleged use of voice-to-skull technology, which enables the transmission of auditory messages directly into an individual's skull. The implications of such technology raise significant concerns regarding personal autonomy, mental health, and the adequacy of current legal frameworks. Reports from victims indicate experiences of harassment, bodily harm, and emotional distress resulting from these invasions of privacy and autonomy. This paper will analyze the legal ramifications of such tortuous acts, alongside the systemic failures in addressing them.



BACKGROUND



Technological Basis

  • Voice-to-skull technology purports to utilize advanced weaponry, including microwaves and radio frequencies, to create auditory hallucinations in victims. According to accounts provided by individuals like Shane Lozenich, the continuous barrage of external voices leads to profound psychological and physical distress. Reports indicate that victims are subjected to not only humiliating and derogatory statements but also experiences that simulate witnessing violence and trauma against others, including children.


Legal Context

  • The legal status of V2K as a form of torture is highly contentious. While international law, particularly under the United Nations Convention Against Torture, offers a framework for addressing such violations, the unique nature of electronic harassment complicates the matter. The reports indicate that victims are often dismissed by law enforcement and medical professionals, resulting in a lack of an effective legal recourse to address or prevent such abuses.


Case Analysis

  • Victims, like the subject of this paper, display profound systemic failures in legal proceedings concerning mental health evaluations and their implications, particularly concerning competency to stand trial. In multiple instances, claims of V2K harassment were disregarded, leading to involuntary psychiatric holds and forced medication without adequate justification. The failure of the judicial system, combined with the victims' denial of autonomy and agency, reveals deep socio-legal issues within the handling of mental health and technology-related cases.



DISCUSSION



Violations of Human Rights

  • The testimonies presented illustrate not only a breach of mental health but also a larger systemic failure that disregards the human dignity of individuals subjected to V2K harassment. The inability of victims to receive appropriate support from governmental and non-governmental entities underscores an urgent need for clear definitions of electronic harassment as a form of torture within legal statutes, thereby enabling victims to seek justice effectively.


Impact on Mental Health

  • Experiences of vocal harassment manifest as severe trauma, resulting in chronic conditions such as anxiety, paralyzed reasoning faculties, and physical pain. The testimony highlights the deterioration of mental health conditions among victims of V2K technology, raising questions about the legal responsibilities of state authorities in recognizing and protecting against such psychological torture.



CONCLUSION



The implications of voice-to-skull technology and its effects on individuals necessitate urgent legislative and judicial attention. The current state of the law fails to adequately protect individuals from systematic abuses of technology that lead to psychological torture. A multipronged approach is required—one that encompasses technological accountability, robust legal frameworks, and protections against invasions of personal autonomy due to emerging technologies. Wider awareness and research into these violations are essential for ensuring that such abusive practices do not continue unaddressed. ​



Laws the Should Protect Citizens from Voice to Skull



UNITED STATES LAWS



Unauthorized interception of communications / wiretapping.

  • Intercepting or using someone’s private oral, wire, or electronic communications without lawful authorization is prohibited under federal law (Title 18 §2511).

Computer Fraud and Abuse Act (CFAA) — unauthorized access

  • Accessing or controlling someone’s phones, email, or other “protected computers” without authorization can violate 18 U.S.C. §1030. Hacking, remote access, or similar intrusions.

Identity/document fraud

  • Producing, transferring, or possessing identification documents unlawfully (for example — a stolen passport or impersonation) can violate federal identity-fraud statutes (18 U.S.C. §1028).

Interstate stalking / cyberstalking

  • Federal anti-stalking statutes criminalize repeated harassment, surveillance, or threats that cross state lines or use interstate commerce (18 U.S.C. §2261A).

Torture (18 U.S.C. 2340A) Section 2340A of Title 18:​

  • United States Code, prohibits torture committed by public officials under color of law against persons within the public official's custody or control. Torture is defined to include acts specifically intended to inflict severe physical or mental pain or suffering. (It does not include such pain or suffering incidental to lawful sanctions.) The statute applies only to acts of torture committed outside the United States. There is Federal extraterritorial jurisdiction over such acts whenever the perpetrator is a national of the United States or the alleged offender is found within the United States, irrespective of the nationality of the victim or the alleged offender.

The Privacy Act of 1974:

  • Requires federal agencies to follow "fair information practices" when collecting, using, and sharing personal data Requires agencies to publish notices of new or modified systems of records in the Federal Register Requires agencies to provide individuals with access to their records and the ability to request corrections Prohibits agencies from disclosing records without the individual's written consent, with some exceptions Allows individuals to sue the government if the Privacy Act is violated
  • Washington state has multiple laws that protect the privacy of its residents, including the Washington Foundational Data Privacy Act and the People's Privacy Act. These laws give consumers rights to access, correct, and delete their personal data. They also prohibit the sale of sensitive data and targeted advertising based on protected characteristics.

Washington Foundational Data Privacy Act:

  • Requires businesses to register with the Washington State Consumer Data Privacy Commission Prohibits targeted advertising based on protected characteristics
  • Allows consumers to take legal action against businesses that violate their data privacy rights

People's Privacy Act:

  • Bans the sale of sensitive data, including health data, precise geolocation data, and data about minors Includes data minimization provisions Includes strong enforcement provisions​

Assault and battery:

  • If V2K were used to inflict auditory sensations without consent, it could be considered a form of physical assault. Intentional infliction of emotional distress: If V2K were used to transmit disturbing or harassing audio directly into someone's mind, it could be considered a form of emotional distress. Surveillance laws: Depending on the implementation, using V2K for surveillance purposes could violate existing laws regarding privacy and wiretapping.​


Bryan Kofron Q&A Video



This social engineering program experiments on the homeless population and the general population of Seattle utilizing what most people know as Voice to Skull (V2K) technology. However, this technology is infinitely more advanced than most people know.




Eric J Hecker Video on V2K



Covering a broad range of subject matter, including information and discussion about Antarctica, directed energy weapons, targeting and the the targeted individual, MK Ultra mind control and remote viewing.



Washington State Fusion Center Article



Washington State Fusion Center accidentally releases records on remote mind control as part of a request for records on Antifa and white supremacist groups, WSFC inadvertently bundles in “EM effects on human body.zip”




Len Ber, MD Video on Psychotronic Weapons



​Leonid “Len” Ber received his MD degree in the former USSR where he specialized and practiced as an endocrinologist. Now a US citizen, Len is one of the few US civilians to ever be officially diagnosed with Havana syndrome. Robert Duncan is a renaissance educated man from Harvard & M.I.T




​CONCLUSION

​

My experiences with V2K torture and technological surveillance place me in direct contact with the sounds and images of violence, leading me to believe that my devices and even my digital identity have been exploited to facilitate terrorist acts. While global statistics confirm that terrorism is rising—fueled by technology, anonymous finance, and extremist networks—the personal reality is that my warnings have been ignored or dismissed. Just as my comments about missing neighbors were used to brand me incompetent, my reports of digital exploitation risk being overlooked. Yet evidence shows that technology, communications systems, and even personal IP addresses can be weaponized for laundering, recruitment, and acts of terror. Washington State has recognized the gravity of these threats by establishing a Domestic Extremism and Mass Violence Task Force to investigate and address them. But until individual accounts like mine are taken seriously, the machinery of modern terrorism will continue to operate in the shadows.



— CONTACT ME —




Shane J Lozenich | Seattle, WA 98104



​thefacts.today





COPYRIGHT © 2025 BY JONATHAN SHANE CONCEPTS