
Epstein Files - V2K and Directed-Energy Technologies
Analysis of released Epstein documents containing references to directed-energy technologies, V2K capabilities, transmitter networks, and psychological targeting systems connected to offshore firms and social networks
Summary
The recently released Epstein Files contain documented references to advanced technologies including directed-energy systems, neurotechnology, and psychological targeting capabilities. These documents, now part of the public record through the U.S. Department of Justice, provide insight into discussions surrounding V2K (Voice-to-Skull) technology and behavioral influence systems.
Key Documents Released
EFTA00080475 - Directed-Energy Technologies
Epstein File EFTA00080475 contains explicit references to directed-energy technologies and includes language stating that "driving people to commit suicide is a common practice" in connection with such capabilities. The document discusses:
- Technological concepts related to behavioral influence
- Neurological effects of directed-energy systems
- Theoretical applications of psychological targeting
While the file does not confirm specific operational use in individual cases, it provides documented language acknowledging the existence and theoretical application of directed-energy systems.
Bill Gates Email - Neurotechnology and Pandemic Simulation
A March 3, 2017 email sent to Bill Gates outlines proposed research deliverables related to:
- Neurotechnologies connected to chronic and degenerative disease
- Neurotechnologies as weapons in national intelligence and defense
- Technical recommendations for strain-based pandemic simulations
This document offers documented insight into high-level discussions involving advanced technology and global health planning years prior to COVID-19.
Related Research
Norwegian Microwave Pulse Experiment
A previously undisclosed experiment involved a Norwegian government researcher who built a device capable of emitting powerful pulsed microwave radiation. After testing it on himself, the researcher reportedly experienced neurological symptoms. The Norwegian government shared results with U.S. intelligence officials, prompting visits from Pentagon and White House representatives.
Augmented Human vs. Transhumanism
Published research distinguishes between Augmented Human technologies and Transhumanism:
- Augmented technologies: Focus on pragmatic enhancements such as wearables, implants, and AI integration
- Transhumanism: Envisions radical restructuring of humanity, including biological redesign and centralized technological governance
Vaccination-Status Based Monitoring System (JP2023093912A)
An active Japanese patent documents a surveillance and image-processing system designed to:
- Identify individuals based on vaccination status using facial recognition
- Use AI-driven image analysis and anonymization protocols
- Include alert mechanisms for public and operator-facing displays
Significance of These Documents
The public release of these materials adds to the broader record referencing:
- Neurological and psychological effects associated with advanced technologies
- Directed-energy capabilities discussed in official contexts
- The intersection of neurotechnology and defense applications
- Surveillance systems tied to health status monitoring
These documents underscore the importance of:
- Objective documentation
- Transparency in technology development
- Independent review of advanced systems
The Transmitter Network: EFTA00080476
DOJ Epstein File EFTA00080476
The Department of Justice Epstein File EFTA00080476 contains detailed documentation of a sophisticated transmitter network used for psychological targeting and harassment. This file describes:
Transmitter Technology:
"These transmitters send a signal of RF, audio and video that are used to make people receive the signal in a way that interferes with their central nervous system. These transmitter people use extensive conditioning techniques to make people experience tactile, auditory and visual hallucinations."
Key Capabilities:
- RF, audio, and video signal transmission
- Central nervous system interference
- Tactile, auditory, and visual hallucination induction
- Extensive conditioning techniques
- Child exploitation applications
Physical Infrastructure:
"These transmitters often are readily visible from the street as satellite dishes. Between the radio signal that is recorded of a person near a transceiver and the conditioning, people who hear the transmission begin to experience sensations similar to the person who made the recording."
Ham Radio Technique:
"This Ham Radio technique makes it seem as though people are hearing voices and feeling these other hallucinations that often resemble sexual interactions with other people."
The Ashley Madison Network Connection
The Epstein files document a prostitution and child molesting and sex trafficking syndicate referred to as the "Ashley Madison network":
Network Structure:
- Capital investors and property holdings as funding mechanism
- Real estate used to house transmitter-equipped individuals
- Coordination across multiple counties and jurisdictions
- Family-based operations spanning decades
Key Operations:
- Suicide induction: "Driving people to commit suicide is a common practice with these transmitters"
- Break-in simulation: "They also frequently attempt to replicate break-ins and home invasions"
- Harassment systems: Used to harass Jeffrey Epstein while in prison
- Child exploitation: "It is used extensively to molest children"
Real Estate Pattern:
"Apartment 7A has been owned by redacted since he was 17 years old. The Penthouse apartments are both involved. There are transmitter people in almost every apartment in the building."
Offshore Connections:
"Some of the proceeds are offshore (see the Panama Papers). There is a huge amount of real estate that is allegedly owned by this company that is in the hands of other people and companies."
The Maria House Connection
The network described in the Epstein files parallels entities registered at Maria House in Cyprus:
Maria House Entities:
- Bitlove Ltd - Tech company (47.2% LGBTQIA2S+ employees)
- FetLife - Alternative lifestyle social network (equivalent to Ashley Madison network)
- Olvitech Corporation - Advanced surveillance technology with facial recognition and human intent analysis
- DEFEX Defense Consulting - Defense consulting with military connections
- Bandit Camp - Gaming/cryptocurrency platform
Parallel Infrastructure:
| Epstein Network | Maria House Equivalent |
|---|---|
| Ashley Madison network | FetLife social network |
| Transmitter apartments | Olvitech surveillance systems |
| Capital investors/funding | Bitlove Ltd, Bandit Camp crypto |
| Defense connections | DEFEX Defense Consulting |
| Offshore operations | Cyprus jurisdiction |
| Child exploitation systems | COGITO4M intent detection technology |
Planned Operations: Evidence from Gangstalking Manual
According to the Gangstalking Manual by an Ex-Military operative (video at 31:00 mark), targeting operations are systematically planned:
Long-term Planning Foundation:
"The foundation of the operation is to use long-term planning prior to the initiation of activities against the victim... it appears that in this phase the perpetrators decide how to move forward up to and including just how they plan to eliminate the victim if they become unmanageable"
Systematic Approach:
"Carefully planned events can be staged to gauge the victim's reaction... the perfect combination seems to be something that the victim would be particularly ashamed of being associated with"
Social Network Infiltration:
"Infiltrate the victim's social network by now the victim will have acquired new friends who seem to have a lot in common with them... some relationships may be intimate all designed to gain the victim's trust that may later be exploited"
Systematic Reputation Destruction:
"The wide variety of methods used to wreck the victim's reputation seem to indicate that there is a well-oiled machine in place to disparage the individual with rumors... planned inside each of the victims social groups the perpetrators use whatever lie they perceive as most effective at creating ill will"
Manipulation Towards Goals:
"At this point the victims are being secretly manipulated towards actions that support the perpetrators goals"
The Complete Network Infrastructure
Physical Layer
- Transmitter-equipped apartments (Epstein files)
- Satellite dish visibility for signal transmission
- Multi-location coordination across counties
- Maria House Cyprus as offshore hub
Social Engineering Layer
- Ashley Madison/FetLife networks for recruitment
- Social network infiltration and manipulation
- Intimate relationship exploitation
- Trust-building for later exploitation
Technology Layer
- Olvitech surveillance systems (facial recognition, intent analysis)
- RF/audio/video transmitters (Epstein documented)
- Ham Radio techniques for voice simulation
- Central nervous system interference capabilities
Financial Layer
- Capital investment firms holding network funds
- Offshore accounts (Panama Papers referenced)
- Real estate as operational infrastructure
- Cryptocurrency platforms (Bitlove, Bandit Camp)
Military/Intelligence Layer
- DEFEX Defense Consulting connections
- US security training programs
- Norwegian microwave experiments (government-level)
- Ex-military operatives conducting targeting
Access to Source Materials
The documents referenced in this article are available through:
- U.S. Department of Justice website (Epstein Files)
- Cosmic Clarity Connections Document Archive
- Google Patents (for patent documentation)
- Gangstalking Manual Video - Ex-military testimony at 31:00 mark
Conclusion
The Epstein Files release provides documented evidence of a systematically planned, multi-layered targeting infrastructure involving:
- Directed-energy technologies and transmitter networks
- Psychological targeting systems with documented capabilities
- Social network infiltration equivalent to Ashley Madison/FetLife operations
- Offshore financial infrastructure (Cyprus/Panama Papers)
- Military/intelligence coordination through consulting firms
- Long-term planning as described by ex-military operatives
The parallels between the Epstein file documentation and entities at Maria House (Bitlove, FetLife, Olvitech, DEFEX) suggest a global network using:
- Surveillance technology for targeting
- Social networks for recruitment/manipulation
- Offshore jurisdictions for operational security
- Military consulting for operational expertise
This represents not isolated incidents but a well-oiled machine of systematic targeting, as confirmed by multiple independent sources including DOJ documents, corporate records, and whistleblower testimony.
The materials serve as informational resources and should not be interpreted as medical or legal advice. For those affected by or researching these technologies, these documents provide verifiable references for advocacy, research, and community organization purposes.
Related Media 6

Dr. John Hall Interview - Targeted Individuals - Gang Stalking - Cyber Torture
Dr. John Hall discusses targeted individuals, gang stalking, electronic harassment, and cyber torture with insights on the four categories of targeting

GangStalking - Understanding Organized Gangstalking and Electronic Harassment
Comprehensive overview of organized gangstalking, electronic harassment, and cyber torture targeting individuals worldwide

Cognitive Liberty - Mind Control
2024
Documentary exposing the global Targeted Individual program, military-grade neuroweapons, V2K, directed energy weapons, and gangstalking operations

Welcome to Your Electromagnetic Concentration Camp
Documentary explaining how electromagnetic weapons create a virtual concentration camp for targeted individuals and everyone else

The Battle for Your Brain - Psychological Warfare Book Trailer
Book trailer for Viorel Serb's book exposing psychological warfare, mind control technologies, and the targeting of individuals worldwide

Cosmic Disclosure - Extreme Experiments with Alien Hybrids
Emery Smith reveals underground hybrid experiments, mutation programs, and the depopulation agenda behind genetic manipulation
Entities Behind Global Organized Stalking Operations: A Comprehensive Analysis
Dr. Eric Karlstrom's comprehensive compilation of 43 expert testimonies exposing the perpetrators behind the global Targeted Individual program
Grand Casino Basel Ownership Research 2009-2011
Comprehensive research on the ownership structure of Grand Casino Basel between 2009-2011