Blog
Feb 17, 2026 - 45 MIN READ

Security Industry Specialist Whistleblower Exposes Massive Social Engineering Program

Former security specialist Bryan Kofron reveals details of a highly classified federal program utilizing voice-to-skull technology, gang stalking, and DNA collection against American citizens, with operations centered in Seattle, Washington.

External Links

Summary

This comprehensive report is based on whistleblower testimony from Bryan Kofron (also known as Justin Carter), a former security industry specialist who worked for Security Industry Specialists (SIS) in Seattle, Washington. Kofron's company held a contract with Amazon Corporation, and it was on Amazon property where he witnessed a massive social engineering program operating as a cover for highly classified research and development. This program experiments on American citizens using advanced voice-to-skull technology, emotion manipulation systems, and organized stalking operations. The following is a detailed breakdown of the program's structure, participants, technology, methods, and locations.


The Whistleblower

Bryan Kofron (Justin Carter)

Bryan Kofron, using the alias Justin Carter, was a security industry specialist employed by Security Industry Specialists (SIS) in Seattle, Washington. His company held a major contract with Amazon Corporation. During his employment, Kofron became aware of and participated in a massive social engineering program that he describes as highly illegal, unconstitutional, and a crime against humanity.

After learning the full extent of the program, Kofron chose to leave his position because he could no longer in good conscience work for what he describes as a corrupt company involved in violating the constitutional rights of American citizens. Since going public with his revelations, Kofron reports that he has become a target of the very program he exposed, experiencing gang stalking, voice-to-skull harassment, and death threats.


The Program Structure

Organizational Hierarchy

The social engineering program Kofron describes involves a complex network of organizations operating under federal government oversight:

Primary Participants

  1. Federal Government of the United States - Overall oversight and authorization
  2. U.S. Intelligence Agencies - CIA, NSA, and other intelligence organizations
  3. Department of Defense (DOD) - Military involvement in R&D
  4. Department of Homeland Security - Domestic operations coordination
  5. Private Security Contractors - Operational implementation
  6. Major Private Corporations - Resource provision and cover
  7. Local and State Police - Local coordination and cover
  8. Social Programs - Access to vulnerable populations

Chain of Command

The program operates through multiple layers:

  • Research and Development Phase - Conducted by military and intelligence services
  • Manufacturing Phase - Defense contractors and private corporations
  • Implementation Phase - Private security companies and social programs
  • Cover-up Phase - Mental health organizations and law enforcement

The Technology

Voice-to-Skull (V2K) Technology

The core technology at the heart of this program is commonly known as "voice-to-skull" but is actually far more advanced than what is publicly known. The technology operates through:

Technical Mechanism

  • Electromagnetic Frequency Technology - Utilizes radio frequency signals
  • Microwave Auditory Effect - Induces sound within the cranial cavity
  • DNA Resonant Frequency Tuning - The "holy grail" that enables total individual control

How DNA Resonant Frequency Works

According to Kofron, the most advanced aspect of this technology involves:

  1. DNA Collection - Obtaining genetic material from targets
  2. DNA Profiling - Creating complete genetic maps
  3. Resonant Frequency Determination - Identifying the unique frequency at which the individual's DNA resonates
  4. Technology Fine-Tuning - Adjusting the radio frequency signals to match the target's DNA resonant frequency

This allows for total control over the target's body, mind, spirit, and soul without requiring any physical implants.

Capabilities of the Technology

Mind Control Functions

  • Thought Reading - Real-time access to the target's thoughts verbatim as they occur
  • Thought Manipulation - Ability to insert, delete, or modify thoughts
  • Memory Manipulation - Creation and deletion of memories
  • Dream Control - Induction and control of dreams, sleep patterns, and REM cycles
  • Mental State Manipulation - Control over alpha, beta, and delta brain waves

Physical Control Functions

  • Muscle Control - Can take over hands, feet, and other body parts
  • Motor Vehicle Manipulation - Force acceleration, braking, or steering while driving
  • Sexual Manipulation - Induce or suppress sexual arousal
  • Hormone Manipulation - Raise or lower estrogen and testosterone levels

Emotional Manipulation

The technology can artificially induce any emotion:

  • Fear, love, hate
  • Nervousness or confidence
  • Depression or happiness
  • Any emotional state on demand

Sensory Manipulation

  • Visual Input - Beam images and motion pictures into the brain (like VR/3D rendering within the mind)
  • Visual Tapping - Access to the optical nerve to see what the target sees
  • Auditory Tapping - Access to the auditory system to hear what the target hears
  • Spiritual Experience Mimicry - Can induce artificial spiritual experiences

Physical Effects on Targets

  • Accelerated Aging - Radio frequency signals literally cook the body
  • Dental Destruction - Radiation destroys teeth
  • Muscle Deterioration - Progressive weakening
  • Joint and Bone Deterioration - Long-term targets become crippled
  • Healing Capabilities - Can also be used positively to heal injuries, cure diseases, manipulate genes and DNA

Data Storage

All visual and auditory data from targets is:

  • Downloaded and stored on highly secure classified servers
  • Guarded by some of the tightest security in the world
  • Kept indefinitely - the target's entire day is recorded "till the end of time"

Hive Mind Application

A more advanced application known as "hive mind" technology is used for:

See Hive Mind for comprehensive documentation of collective consciousness systems.

  • Military Coordination - Coordinating troop movements on the battlefield
  • Secure Communication - Difficult to hack when properly secured
  • Super Soldier Development - Enhanced decision-making, endurance, and strength
  • Speed of Thought Communication - Soldiers can read each other's thoughts in real-time

Field Effect Population Control

The technology can be applied on a massive scale:

  • Electromagnetic Field Creation - Entire geographical areas can be enveloped
  • Group Size - Can affect groups from 10 people to tens of thousands
  • Applications:
    • Induce general mood in populations or crowds
    • Make populations passive or agitated
    • Cause or stop riots
    • Start or stop crime
    • Massive mind control on a city-wide level

Client and Corporate Involvement

The Primary Client

Kofron's private security company (SIS) was contracted with one of the largest and most powerful corporations in America, headquartered in Seattle, Washington. While Kofron explicitly names Amazon Corporation in his second podcast, he indicates that multiple major corporations are involved.

Corporate DNA Database

The client maintains a massive DNA database containing profiles of millions of Americans. This database is:

  • Considered the most valuable asset on the property
  • Heavily guarded with 24/7 security
  • Used for scientific research purposes officially
  • Also utilized for targeting individuals with the voice-to-skull technology

Relationship Structure

Private security companies have primary responsibilities to their clients. In this case:

  • The client's needs became the security company's primary focus
  • Other contracts were dropped or neglected in favor of this client
  • The security company became deeply involved in the social engineering program

Target Demographics

Primary Target Groups

The program specifically targets individuals who lack the resources to defend themselves:

  1. Homeless Population - Particularly in Seattle's shelter system
  2. Financially Struggling Individuals - Those with limited economic means
  3. Isolated Individuals - People without strong family or friend networks
  4. Employees of Participating Organizations - Security specialists, social workers

Why These Groups?

These populations are targeted because they:

  • Have no means to defend themselves
  • Are less likely to be believed if they complain
  • Can be easily discredited through mental health diagnoses
  • Lack the financial resources to pursue legal action

Test Subjects vs. Targets

Within the program:

  • Test Subjects - People being actively experimented upon
  • Targets - Individuals marked for harassment and control
  • Both are treated as "lab rats" with no rights or respect

DNA Collection Methods

How DNA is Obtained

The program has developed sophisticated methods for collecting genetic material:

Employment Drug Testing

  1. Job Application - Individual applies to private security company
  2. Interview Process - Standard hiring procedures
  3. Drug Test Requirement - Mandatory urine/blood/saliva screening as condition of employment
  4. Sample Interception - DNA is siphoned off during the drug testing process
  5. DNA Transfer - Genetic material is sent to the client's database

Laboratory Partnerships

  • LabCorp - Laboratory Corporation of America
  • Quest Diagnostics - Major diagnostic testing company
  • Sperm Banks - Also mentioned as sources of genetic material

Scale of Collection

  • For every one employee hired, many more applicants are processed
  • DNA is collected regardless of whether the person is hired
  • Over time, this builds a massive database of millions of Americans
  • The number grows every day

Gang Stalking Operations

Definition

Gang stalking (also called "organized stalking") is the human surveillance component of the program. It involves personnel following, monitoring, and harassing targeted individuals 24 hours a day.

Personnel Involved

Gang stalkers are recruited from:

  • Ex-Military Personnel - Veterans seeking employment after service
  • Ex-Intelligence Agents - Former CIA, NSA, and other agency operatives
  • Private Security Specialists - Trained in surveillance and harassment
  • Social Workers - Particularly those working with homeless populations
  • Local Citizens - Recruited from communities

Job Requirements

Help wanted ads for gang stalking positions typically specify:

  • Cell phone with good reception required
  • Must be on call 24 hours a day
  • Must be ready to respond at a moment's notice
  • Both static and mobile positions available

Operational Methods

Once activated, gang stalkers:

  1. Receive text or call with target location
  2. Are given specific activities to carry out
  3. Surround and monitor the target continuously
  4. Isolate the target from support networks

Purpose

The gang stalking component serves to:

  • Isolate the Target - Separate them from family, friends, and community
  • Discredit the Target - Make them appear paranoid or mentally unstable
  • Induce Psychological Distress - Constant harassment breaks down mental health
  • Prevent Employment - Sabotage career opportunities
  • Destroy Relationships - Turn loved ones against the target

Cover-Up Methods

Mental Health System Complicity

A key cover-up mechanism involves the psychological profession:

  1. Target Complains - Individual reports hearing voices or being stalked
  2. Psychiatric Referral - Person is funneled to mental health professionals
  3. False Diagnosis - Psychiatrists (often directly paid by the program) render diagnoses of:
    • Schizophrenia
    • Multiple Personality Disorder
    • Delusional Disorder
    • Paranoid Personality Disorder
  4. Discreditation - If target speaks out, mental health records are released to discredit them

Law Enforcement Complicity

When Kofron reported the program to authorities:

  • FBI Response - "What you are describing is a federal program. We know exactly what it is, and as a result, there is absolutely nothing we can do about it."
  • Local Police Response - Similar acknowledgment that they cannot intervene

Social Isolation Strategy

The program is designed to:

  • Make targets sound crazy when describing their experiences
  • Cause general public to dismiss claims as mental illness
  • Ensure targets have nowhere to turn for help

Known Locations

Seattle, Washington

Seattle serves as a primary hub for the program. The entire city is described as a social engineering experiment with operations at both macro (societal) and micro (individual) levels.

157 Roy Street (Queen Anne, Washington)

  • Location: 157 Roy Street, Queen Anne, Washington
  • Facility: Converted power plant turned homeless shelter
  • Capacity: Houses approximately 108 homeless men
  • Purpose: Testing ground for voice-to-skull and emotion manipulation technology
  • All Residents: Subjected to experimentation

Key Personnel mentioned:

  • Corey
  • Kyle Andrew Coke

Downtown Emergency Service Center (DESC)

  • Address: 505 Third Avenue, Seattle, Washington 98104
  • Function: Primary homeless shelter and testing facility
  • Operations:
    • Constantly updated versions of V2K technology tested on victims
    • "Hive mind" technology refined through coordinated stalking tactics
    • Participation is involuntary - residents are "modern day slaves"
  • Employment Sabotage: Staff prevent residents from obtaining jobs to keep them as test subjects

Department of Homeland Security Office

  • Located directly across from a homeless shelter
  • Downtown Seattle location
  • Integral part of the social engineering program

Relocation Pipeline

Targets are often relocated to Seattle through a systematic process:

  1. Forced from Home - Voice-to-skull and gang stalking used to force victim out of their city
  2. Greyhound Bus Transport - Victim forced to buy bus ticket to Seattle
  3. En Route Torture - Interception by thugs on the bus; victim drugged, robbed, tortured
  4. False Confessions - Beaten out of victim to prevent later law enforcement contact
  5. ID Theft - ID, credit cards, social security card, and cell phone stolen
  6. Highway Drop-off - Left on side of highway outside Seattle
  7. Wandering Period - Days of aimless wandering with no money, food, or water
  8. Psychological Torture - Voice-to-skull induces hallucinations and relentless torture
  9. Rescue and Repeat - Picked up, revived, dropped off again
  10. DESC Intake - Eventually guided to downtown emergency services

The Dating Game Application

Social Manipulation

Kofron reveals that the technology is being used as a multi-billion dollar "dating game":

  • Operators play matchmaker using emotion manipulation
  • Can cause instant attraction between any two people
  • Make individuals fall in love with specific partners
  • Break up couples, marriages, and families
  • Manipulate society at every level for their own benefit

Attitude of Operators

Those running the program:

  • Treat it like a video game (Civilization meets The Sims)
  • Are often intoxicated while operating the technology
  • Have a "jovial" attitude toward destroying lives
  • Play "high school pranks" using the most powerful technology in the world

Call to Action

For Insiders

Kofron calls on those within the program to:

  • Come forward and blow the whistle
  • Contact Congress, senators, and local law enforcement
  • Speak to neighbors, family, and friends
  • Spread the word "far and wide"

For the Public

  • Contact congressional representatives and senators
  • Organize at the community level
  • Visit the named locations and demand answers
  • Spread awareness of voice-to-skull, gang stalking, and social engineering

For Law Enforcement and Military

Kofron reminds those charged with protection:

  • They took an oath to protect the American people
  • They have failed to live up to that oath through "complicity or complacency"
  • "All it takes for evil to prosper is for good people to do nothing"

Evidence Location

Targeted Individual Files

Kofron states that:

  • Files exist on computers containing everything he has seen and heard since being targeted
  • Similar files exist for every targeted individual
  • Gang stalkers themselves are under surveillance - their activities are also recorded
  • This evidence would be "irrefutable proof" of the program's existence and nature

Access to Evidence

  • One good person in a position of power could demand access to these files
  • The files would expose the entire program from start to finish
  • They would reveal just how sick and out of control the program has become

The Positive Potential

Beneficial Applications

Kofron acknowledges that the same technology could be used for miraculous purposes:

  • Healing - Make the blind see, the deaf hear, the lame walk
  • Medical Advances - Cure diseases by manipulating genes and DNA
  • Injury Recovery - Repair ACL/MCL sprains in hours
  • Prosthetics - Restore full feeling and functionality to prosthetic limbs for amputees
  • Veteran Care - Help those who lost limbs in service

Non-Lethal Weapons Law

According to U.S. law, it is legal for the federal government to experiment on American citizens with non-lethal weaponry, provided:

  • The government fairly compensates test subjects for damages inflicted

This means:

  • Every targeted individual is entitled to financial compensation
  • The government must pay for the harm it has caused

Conclusion

The testimony of Bryan Kofron provides an unprecedented insider view of what appears to be a massive, well-coordinated program operating within the United States. While his claims are extraordinary and require independent verification, they align with reports from numerous targeted individuals across the country.

The program described involves the convergence of:

  • Advanced directed energy technologies
  • Comprehensive surveillance capabilities
  • Organized harassment campaigns
  • DNA collection and profiling
  • Institutional cover-ups through the mental health system

Whether one accepts Kofron's testimony in whole, in part, or not at all, the questions raised demand investigation. If even a fraction of his claims are true, the implications for American civil liberties and human rights are profound.

The most disturbing aspect may not be the technology itself, but the character of those wielding it. As Kofron states, the people running this program are "juvenile and sophomoric in attitude, irresponsible in disposition, and completely out of control."

The ultimate question is whether institutions designed to protect American citizens will investigate these claims or continue to dismiss them. As Kofron notes, all it takes for evil to prosper is for good people to do nothing.


Sources


Connection to Personal Case

The testimony of Bryan Kofron directly connects to the personal case documentation through the Amazon/AWS infrastructure:

Amazon Corporation Involvement

Kofron explicitly identifies Amazon Corporation as the primary client maintaining the DNA database and facilitating the social engineering program. This connects to:

Personal Case ElementAmazon Connection
AWS ZürichIdentified via map dowsing as potential RNM source
Marc Andreas NuferConnected to Amazon Kuiper Services Europe SARL
DARPA HIVE ProgramAWS collaboration for graph analytics and targeting
Phygify WalletConnect IssuesConsenSys AG (MetaMask) same address as former Binance

Handler Source Location

The Mythenquai 10, 8002 Zürich location identified through blind map dowsing:

  • Near Amazon Kuiper Services Europe SARL operations
  • Marc Andreas Nufer connection confirmed via Moneyhouse
  • Military communication (V2K) when location was identified
  • Suggests AWS HIVE infrastructure for targeting coordination

Hive Mind Application

Kofron describes "hive mind" technology for military coordination - this aligns with:

  • DARPA HIVE Program collaboration with AWS
  • Collective consciousness systems documented in Hive Mind
  • The speed-of-thought communication between handlers and targets

Related Media 6

Cognitive Liberty - Mind Control
YouTube

Cognitive Liberty - Mind Control

2024

Documentary exposing the global Targeted Individual program, military-grade neuroweapons, V2K, directed energy weapons, and gangstalking operations

Dr. John Hall Interview - Targeted Individuals - Gang Stalking - Cyber Torture
YouTube

Dr. John Hall Interview - Targeted Individuals - Gang Stalking - Cyber Torture

Dr. John Hall discusses targeted individuals, gang stalking, electronic harassment, and cyber torture with insights on the four categories of targeting

Meet the Targeted Individual Community
YouTube

Meet the Targeted Individual Community

VICE documentary following targeted individuals who claim government harassment using hidden technology including V2K and electronic torture

GangStalking - Understanding Organized Gangstalking and Electronic Harassment
YouTube

GangStalking - Understanding Organized Gangstalking and Electronic Harassment

Comprehensive overview of organized gangstalking, electronic harassment, and cyber torture targeting individuals worldwide

DARPA's Secret Mind Control Technology
YouTube

DARPA's Secret Mind Control Technology

History Channel reveals DARPA's initiative to develop nonsurgical neurotechnology for mind control applications

Dealing with Voice to Skull - Tips
YouTube

Dealing with Voice to Skull - Tips

Practical advice for managing and coping with Voice to Skull (V2K) attacks