Security Industry Specialist Whistleblower Exposes Massive Social Engineering Program
Former security specialist Bryan Kofron reveals details of a highly classified federal program utilizing voice-to-skull technology, gang stalking, and DNA collection against American citizens, with operations centered in Seattle, Washington.
Summary
This comprehensive report is based on whistleblower testimony from Bryan Kofron (also known as Justin Carter), a former security industry specialist who worked for Security Industry Specialists (SIS) in Seattle, Washington. Kofron's company held a contract with Amazon Corporation, and it was on Amazon property where he witnessed a massive social engineering program operating as a cover for highly classified research and development. This program experiments on American citizens using advanced voice-to-skull technology, emotion manipulation systems, and organized stalking operations. The following is a detailed breakdown of the program's structure, participants, technology, methods, and locations.
The Whistleblower
Bryan Kofron (Justin Carter)
Bryan Kofron, using the alias Justin Carter, was a security industry specialist employed by Security Industry Specialists (SIS) in Seattle, Washington. His company held a major contract with Amazon Corporation. During his employment, Kofron became aware of and participated in a massive social engineering program that he describes as highly illegal, unconstitutional, and a crime against humanity.
After learning the full extent of the program, Kofron chose to leave his position because he could no longer in good conscience work for what he describes as a corrupt company involved in violating the constitutional rights of American citizens. Since going public with his revelations, Kofron reports that he has become a target of the very program he exposed, experiencing gang stalking, voice-to-skull harassment, and death threats.
The Program Structure
Organizational Hierarchy
The social engineering program Kofron describes involves a complex network of organizations operating under federal government oversight:
Primary Participants
- Federal Government of the United States - Overall oversight and authorization
- U.S. Intelligence Agencies - CIA, NSA, and other intelligence organizations
- Department of Defense (DOD) - Military involvement in R&D
- Department of Homeland Security - Domestic operations coordination
- Private Security Contractors - Operational implementation
- Major Private Corporations - Resource provision and cover
- Local and State Police - Local coordination and cover
- Social Programs - Access to vulnerable populations
Chain of Command
The program operates through multiple layers:
- Research and Development Phase - Conducted by military and intelligence services
- Manufacturing Phase - Defense contractors and private corporations
- Implementation Phase - Private security companies and social programs
- Cover-up Phase - Mental health organizations and law enforcement
The Technology
Voice-to-Skull (V2K) Technology
The core technology at the heart of this program is commonly known as "voice-to-skull" but is actually far more advanced than what is publicly known. The technology operates through:
Technical Mechanism
- Electromagnetic Frequency Technology - Utilizes radio frequency signals
- Microwave Auditory Effect - Induces sound within the cranial cavity
- DNA Resonant Frequency Tuning - The "holy grail" that enables total individual control
How DNA Resonant Frequency Works
According to Kofron, the most advanced aspect of this technology involves:
- DNA Collection - Obtaining genetic material from targets
- DNA Profiling - Creating complete genetic maps
- Resonant Frequency Determination - Identifying the unique frequency at which the individual's DNA resonates
- Technology Fine-Tuning - Adjusting the radio frequency signals to match the target's DNA resonant frequency
This allows for total control over the target's body, mind, spirit, and soul without requiring any physical implants.
Capabilities of the Technology
Mind Control Functions
- Thought Reading - Real-time access to the target's thoughts verbatim as they occur
- Thought Manipulation - Ability to insert, delete, or modify thoughts
- Memory Manipulation - Creation and deletion of memories
- Dream Control - Induction and control of dreams, sleep patterns, and REM cycles
- Mental State Manipulation - Control over alpha, beta, and delta brain waves
Physical Control Functions
- Muscle Control - Can take over hands, feet, and other body parts
- Motor Vehicle Manipulation - Force acceleration, braking, or steering while driving
- Sexual Manipulation - Induce or suppress sexual arousal
- Hormone Manipulation - Raise or lower estrogen and testosterone levels
Emotional Manipulation
The technology can artificially induce any emotion:
- Fear, love, hate
- Nervousness or confidence
- Depression or happiness
- Any emotional state on demand
Sensory Manipulation
- Visual Input - Beam images and motion pictures into the brain (like VR/3D rendering within the mind)
- Visual Tapping - Access to the optical nerve to see what the target sees
- Auditory Tapping - Access to the auditory system to hear what the target hears
- Spiritual Experience Mimicry - Can induce artificial spiritual experiences
Physical Effects on Targets
- Accelerated Aging - Radio frequency signals literally cook the body
- Dental Destruction - Radiation destroys teeth
- Muscle Deterioration - Progressive weakening
- Joint and Bone Deterioration - Long-term targets become crippled
- Healing Capabilities - Can also be used positively to heal injuries, cure diseases, manipulate genes and DNA
Data Storage
All visual and auditory data from targets is:
- Downloaded and stored on highly secure classified servers
- Guarded by some of the tightest security in the world
- Kept indefinitely - the target's entire day is recorded "till the end of time"
Hive Mind Application
A more advanced application known as "hive mind" technology is used for:
See Hive Mind for comprehensive documentation of collective consciousness systems.
- Military Coordination - Coordinating troop movements on the battlefield
- Secure Communication - Difficult to hack when properly secured
- Super Soldier Development - Enhanced decision-making, endurance, and strength
- Speed of Thought Communication - Soldiers can read each other's thoughts in real-time
Field Effect Population Control
The technology can be applied on a massive scale:
- Electromagnetic Field Creation - Entire geographical areas can be enveloped
- Group Size - Can affect groups from 10 people to tens of thousands
- Applications:
- Induce general mood in populations or crowds
- Make populations passive or agitated
- Cause or stop riots
- Start or stop crime
- Massive mind control on a city-wide level
Client and Corporate Involvement
The Primary Client
Kofron's private security company (SIS) was contracted with one of the largest and most powerful corporations in America, headquartered in Seattle, Washington. While Kofron explicitly names Amazon Corporation in his second podcast, he indicates that multiple major corporations are involved.
Corporate DNA Database
The client maintains a massive DNA database containing profiles of millions of Americans. This database is:
- Considered the most valuable asset on the property
- Heavily guarded with 24/7 security
- Used for scientific research purposes officially
- Also utilized for targeting individuals with the voice-to-skull technology
Relationship Structure
Private security companies have primary responsibilities to their clients. In this case:
- The client's needs became the security company's primary focus
- Other contracts were dropped or neglected in favor of this client
- The security company became deeply involved in the social engineering program
Target Demographics
Primary Target Groups
The program specifically targets individuals who lack the resources to defend themselves:
- Homeless Population - Particularly in Seattle's shelter system
- Financially Struggling Individuals - Those with limited economic means
- Isolated Individuals - People without strong family or friend networks
- Employees of Participating Organizations - Security specialists, social workers
Why These Groups?
These populations are targeted because they:
- Have no means to defend themselves
- Are less likely to be believed if they complain
- Can be easily discredited through mental health diagnoses
- Lack the financial resources to pursue legal action
Test Subjects vs. Targets
Within the program:
- Test Subjects - People being actively experimented upon
- Targets - Individuals marked for harassment and control
- Both are treated as "lab rats" with no rights or respect
DNA Collection Methods
How DNA is Obtained
The program has developed sophisticated methods for collecting genetic material:
Employment Drug Testing
- Job Application - Individual applies to private security company
- Interview Process - Standard hiring procedures
- Drug Test Requirement - Mandatory urine/blood/saliva screening as condition of employment
- Sample Interception - DNA is siphoned off during the drug testing process
- DNA Transfer - Genetic material is sent to the client's database
Laboratory Partnerships
- LabCorp - Laboratory Corporation of America
- Quest Diagnostics - Major diagnostic testing company
- Sperm Banks - Also mentioned as sources of genetic material
Scale of Collection
- For every one employee hired, many more applicants are processed
- DNA is collected regardless of whether the person is hired
- Over time, this builds a massive database of millions of Americans
- The number grows every day
Gang Stalking Operations
Definition
Gang stalking (also called "organized stalking") is the human surveillance component of the program. It involves personnel following, monitoring, and harassing targeted individuals 24 hours a day.
Personnel Involved
Gang stalkers are recruited from:
- Ex-Military Personnel - Veterans seeking employment after service
- Ex-Intelligence Agents - Former CIA, NSA, and other agency operatives
- Private Security Specialists - Trained in surveillance and harassment
- Social Workers - Particularly those working with homeless populations
- Local Citizens - Recruited from communities
Job Requirements
Help wanted ads for gang stalking positions typically specify:
- Cell phone with good reception required
- Must be on call 24 hours a day
- Must be ready to respond at a moment's notice
- Both static and mobile positions available
Operational Methods
Once activated, gang stalkers:
- Receive text or call with target location
- Are given specific activities to carry out
- Surround and monitor the target continuously
- Isolate the target from support networks
Purpose
The gang stalking component serves to:
- Isolate the Target - Separate them from family, friends, and community
- Discredit the Target - Make them appear paranoid or mentally unstable
- Induce Psychological Distress - Constant harassment breaks down mental health
- Prevent Employment - Sabotage career opportunities
- Destroy Relationships - Turn loved ones against the target
Cover-Up Methods
Mental Health System Complicity
A key cover-up mechanism involves the psychological profession:
- Target Complains - Individual reports hearing voices or being stalked
- Psychiatric Referral - Person is funneled to mental health professionals
- False Diagnosis - Psychiatrists (often directly paid by the program) render diagnoses of:
- Schizophrenia
- Multiple Personality Disorder
- Delusional Disorder
- Paranoid Personality Disorder
- Discreditation - If target speaks out, mental health records are released to discredit them
Law Enforcement Complicity
When Kofron reported the program to authorities:
- FBI Response - "What you are describing is a federal program. We know exactly what it is, and as a result, there is absolutely nothing we can do about it."
- Local Police Response - Similar acknowledgment that they cannot intervene
Social Isolation Strategy
The program is designed to:
- Make targets sound crazy when describing their experiences
- Cause general public to dismiss claims as mental illness
- Ensure targets have nowhere to turn for help
Known Locations
Seattle, Washington
Seattle serves as a primary hub for the program. The entire city is described as a social engineering experiment with operations at both macro (societal) and micro (individual) levels.
157 Roy Street (Queen Anne, Washington)
- Location: 157 Roy Street, Queen Anne, Washington
- Facility: Converted power plant turned homeless shelter
- Capacity: Houses approximately 108 homeless men
- Purpose: Testing ground for voice-to-skull and emotion manipulation technology
- All Residents: Subjected to experimentation
Key Personnel mentioned:
- Corey
- Kyle Andrew Coke
Downtown Emergency Service Center (DESC)
- Address: 505 Third Avenue, Seattle, Washington 98104
- Function: Primary homeless shelter and testing facility
- Operations:
- Constantly updated versions of V2K technology tested on victims
- "Hive mind" technology refined through coordinated stalking tactics
- Participation is involuntary - residents are "modern day slaves"
- Employment Sabotage: Staff prevent residents from obtaining jobs to keep them as test subjects
Department of Homeland Security Office
- Located directly across from a homeless shelter
- Downtown Seattle location
- Integral part of the social engineering program
Relocation Pipeline
Targets are often relocated to Seattle through a systematic process:
- Forced from Home - Voice-to-skull and gang stalking used to force victim out of their city
- Greyhound Bus Transport - Victim forced to buy bus ticket to Seattle
- En Route Torture - Interception by thugs on the bus; victim drugged, robbed, tortured
- False Confessions - Beaten out of victim to prevent later law enforcement contact
- ID Theft - ID, credit cards, social security card, and cell phone stolen
- Highway Drop-off - Left on side of highway outside Seattle
- Wandering Period - Days of aimless wandering with no money, food, or water
- Psychological Torture - Voice-to-skull induces hallucinations and relentless torture
- Rescue and Repeat - Picked up, revived, dropped off again
- DESC Intake - Eventually guided to downtown emergency services
The Dating Game Application
Social Manipulation
Kofron reveals that the technology is being used as a multi-billion dollar "dating game":
- Operators play matchmaker using emotion manipulation
- Can cause instant attraction between any two people
- Make individuals fall in love with specific partners
- Break up couples, marriages, and families
- Manipulate society at every level for their own benefit
Attitude of Operators
Those running the program:
- Treat it like a video game (Civilization meets The Sims)
- Are often intoxicated while operating the technology
- Have a "jovial" attitude toward destroying lives
- Play "high school pranks" using the most powerful technology in the world
Call to Action
For Insiders
Kofron calls on those within the program to:
- Come forward and blow the whistle
- Contact Congress, senators, and local law enforcement
- Speak to neighbors, family, and friends
- Spread the word "far and wide"
For the Public
- Contact congressional representatives and senators
- Organize at the community level
- Visit the named locations and demand answers
- Spread awareness of voice-to-skull, gang stalking, and social engineering
For Law Enforcement and Military
Kofron reminds those charged with protection:
- They took an oath to protect the American people
- They have failed to live up to that oath through "complicity or complacency"
- "All it takes for evil to prosper is for good people to do nothing"
Evidence Location
Targeted Individual Files
Kofron states that:
- Files exist on computers containing everything he has seen and heard since being targeted
- Similar files exist for every targeted individual
- Gang stalkers themselves are under surveillance - their activities are also recorded
- This evidence would be "irrefutable proof" of the program's existence and nature
Access to Evidence
- One good person in a position of power could demand access to these files
- The files would expose the entire program from start to finish
- They would reveal just how sick and out of control the program has become
The Positive Potential
Beneficial Applications
Kofron acknowledges that the same technology could be used for miraculous purposes:
- Healing - Make the blind see, the deaf hear, the lame walk
- Medical Advances - Cure diseases by manipulating genes and DNA
- Injury Recovery - Repair ACL/MCL sprains in hours
- Prosthetics - Restore full feeling and functionality to prosthetic limbs for amputees
- Veteran Care - Help those who lost limbs in service
Legal Framework
Non-Lethal Weapons Law
According to U.S. law, it is legal for the federal government to experiment on American citizens with non-lethal weaponry, provided:
- The government fairly compensates test subjects for damages inflicted
This means:
- Every targeted individual is entitled to financial compensation
- The government must pay for the harm it has caused
Conclusion
The testimony of Bryan Kofron provides an unprecedented insider view of what appears to be a massive, well-coordinated program operating within the United States. While his claims are extraordinary and require independent verification, they align with reports from numerous targeted individuals across the country.
The program described involves the convergence of:
- Advanced directed energy technologies
- Comprehensive surveillance capabilities
- Organized harassment campaigns
- DNA collection and profiling
- Institutional cover-ups through the mental health system
Whether one accepts Kofron's testimony in whole, in part, or not at all, the questions raised demand investigation. If even a fraction of his claims are true, the implications for American civil liberties and human rights are profound.
The most disturbing aspect may not be the technology itself, but the character of those wielding it. As Kofron states, the people running this program are "juvenile and sophomoric in attitude, irresponsible in disposition, and completely out of control."
The ultimate question is whether institutions designed to protect American citizens will investigate these claims or continue to dismiss them. As Kofron notes, all it takes for evil to prosper is for good people to do nothing.
Sources
- Original Podcast #1: Security Industry Specialist Tells All - Gangstalkerwars.com
- Original Podcast #2: Security Industry Specialist Tells All - Gangstalkerwars.com
- YouTube: https://www.youtube.com/watch?v=KcDBS2HE-70
- YouTube: https://www.youtube.com/watch?v=0z9QodNdmco
- Website: https://gangstalkerwars.com
Connection to Personal Case
The testimony of Bryan Kofron directly connects to the personal case documentation through the Amazon/AWS infrastructure:
Amazon Corporation Involvement
Kofron explicitly identifies Amazon Corporation as the primary client maintaining the DNA database and facilitating the social engineering program. This connects to:
| Personal Case Element | Amazon Connection |
|---|---|
| AWS Zürich | Identified via map dowsing as potential RNM source |
| Marc Andreas Nufer | Connected to Amazon Kuiper Services Europe SARL |
| DARPA HIVE Program | AWS collaboration for graph analytics and targeting |
| Phygify WalletConnect Issues | ConsenSys AG (MetaMask) same address as former Binance |
Handler Source Location
The Mythenquai 10, 8002 Zürich location identified through blind map dowsing:
- Near Amazon Kuiper Services Europe SARL operations
- Marc Andreas Nufer connection confirmed via Moneyhouse
- Military communication (V2K) when location was identified
- Suggests AWS HIVE infrastructure for targeting coordination
Hive Mind Application
Kofron describes "hive mind" technology for military coordination - this aligns with:
- DARPA HIVE Program collaboration with AWS
- Collective consciousness systems documented in Hive Mind
- The speed-of-thought communication between handlers and targets
Related Documentation
Related Media 6

Cognitive Liberty - Mind Control
2024
Documentary exposing the global Targeted Individual program, military-grade neuroweapons, V2K, directed energy weapons, and gangstalking operations

Dr. John Hall Interview - Targeted Individuals - Gang Stalking - Cyber Torture
Dr. John Hall discusses targeted individuals, gang stalking, electronic harassment, and cyber torture with insights on the four categories of targeting

Meet the Targeted Individual Community
VICE documentary following targeted individuals who claim government harassment using hidden technology including V2K and electronic torture

GangStalking - Understanding Organized Gangstalking and Electronic Harassment
Comprehensive overview of organized gangstalking, electronic harassment, and cyber torture targeting individuals worldwide

DARPA's Secret Mind Control Technology
History Channel reveals DARPA's initiative to develop nonsurgical neurotechnology for mind control applications

Dealing with Voice to Skull - Tips
Practical advice for managing and coping with Voice to Skull (V2K) attacks
Grand Casino Basel Ownership Research 2009-2011
Comprehensive research on the ownership structure of Grand Casino Basel between 2009-2011
The SpiderNet Connection: How Gambling Payment Processors and Surveillance Tech Share Names, Locations, and Control Networks
Investigation into the suspicious overlap between Spidernet Services Limited (gambling payment processor) and SpiderNet System (surveillance technology), both operating from Cyprus and connected to the Maria House intelligence hub.