V2K and Electronic Harassment : Psychotronic Cyber Crime Techniques

Authors

  • Ms. Shilpi Jain  Assistant Professor, Department of Mathematics, Atma Ram Sanatan Dharma College, University of Delhi, India
  • Dr. Madhur Jain  Assistant Professor, Department of Information Technology, Bhagwan Parshuram Institute of Technology, Guru Gobind Singh Indraprastha University, Delhi, India
  • Yuvah L Kumar  UG Student, Department of Information Technology, Bhagwan Parshuram Institute of Technology, Guru Gobind Singh Indraprastha University, Delhi, India

DOI:

https://doi.org//10.32628/CSEIT2390249

Keywords:

Voice-to-Skull (V2K), Psychotronic Weapons, Synthetic Telepathy, Electronic-Harassment, BCI, Microwave Hearing, Target Individual (TI)

Abstract

Hackers have started taking help from ancient techniques like Telepathy and Hypnosis as Psychotronic Weapons for committing cybercrimes. Psychotronic Weapons mean Brain Manipulation from a Distance. These weapons interact with the nervous system of the target individual, affecting the target's conscious and subconscious mind, and resulting in suffering. A TI is a person being tortured by Psychotronic Weapons [2]. There are a variety of means that are used remotely to harm and control their target. Some of these techniques are Voice-to-Skull (V2K), Synthetic Telepathy, Electronic Harassment, Microwave Hearing, Boys-to-School technology, Voice-of-God weapon, and Brain- Computer-Interface (BCI). You may have not heard of these terms earlier, but we found many websites dedicated to this phenomenon. These voices are being transmitted by microwaves and by misuse of online surveillance technologies. These methods, unfortunately, have become another tool to aid organized crimes run by criminals and terrorist groups worldwide. Media in the USA had widely reported such types of cybercrimes in the past decade. Their law enforcement agencies faced challenges to counter such offenses. We would like to bring to your attention an overview of this less talked about form of online crime and a few ways to protect ourselves from being its victims.

References

  1. https://www.researchgate.net/publication/360541055_Targeted_Individuals_TIs_and_Electronic_Harassment
  2. https://www.ohchr.org/sites/default/files/Documents/Issues/Torture/Call/Individuals/Militarygrade.pdf
  3. https://en.wikipedia.org/wiki/Electronic_harassment
  4. http://timesofindia.indiatimes.com/articleshow/3596708.cms?fbclid=IwAR2kun6TsipA737b6bASJpajH1FBW9pheQKdfXzHZ6ptvh7mzXN6eNLAyI&from=mdr&utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
  5. https://vimeo.com/101419613
  6. http://timesofindia.indiatimes.com/articleshow/3596708.cms?fbclid=IwAR2kun6TsipA737b6bASJpajH1FBW9pheQKdfXzHZ6ptvh7mzXN6eNLAyI&from=mdr&utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
  7. http://satelliteterrorism3.blogspot.com/2010/12/dew-directed-energy-weapons.html
  8. http://www.targeted-individuals.com/symptoms-of-harassment/4568080185

Downloads

Published

2023-04-30

Issue

Section

Research Articles

How to Cite

[1]
Ms. Shilpi Jain, Dr. Madhur Jain, Yuvah L Kumar, " V2K and Electronic Harassment : Psychotronic Cyber Crime Techniques, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 2, pp.334-338, March-April-2023. Available at doi : https://doi.org/10.32628/CSEIT2390249