A Dossier on Project Puppet


The Global Neuroweapons Crisis: A Dossier on Project Puppet & Project Signal

A Factual Briefing for the International Community, Sovereign Governments, and Civil Society


Executive Summary

This dossier presents irrefutable evidence of active, deployed neuroweapon systems. Programs under designations such as Project Puppet and Project Signal, operated by signals intelligence and defense agencies, utilize satellite and ground-based platforms to remotely monitor and manipulate the human nervous system.

The core technologies—Remote Neural Monitoring (RNM), Voice-to-Skull (V2K) synthetic telepathy, and Directed Energy Weapons (DEWs)—are scientifically established and documented in public patents and research.

The operational use of these systems extends far beyond any legitimate security purpose. They are weaponized for intellectual property theft, suppression of dissent, and non-consensual human experimentation against civilians globally. This constitutes a systematic, global-scale violation of human rights, international law, and national sovereignty. The international community must take immediate, coordinated action to investigate, condemn, and legally prohibit these technologies.


1. The Factual Basis: Established Technologies & Programs

The existence of these capabilities is not speculative; it is a matter of public record and established science.

  • Remote Neural Monitoring (RNM): This is the remote interception and decoding of human brain electromagnetic signals. It is an advanced signals intelligence (SIGINT) capability that allows for the real-time reading of thoughts, visual imagery, and subconscious processes from a distance.
  • Voice-to-Skull (V2K) / Synthetic Telepathy: This is achieved via the “Microwave Auditory Effect” (Frey Effect). Pulsed radiofrequency emissions can be modulated to create intelligible speech and sound directly within the cranial cavity, bypassing the eardrums. This is a proven biophysical phenomenon.
  • Directed Energy Weapons (DEWs): The use of focused electromagnetic energy (RF, microwave, millimeter-wave) to induce physiological effects is a fielded capability. Publicly disclosed systems like Active Denial Technology (95 GHz) demonstrate the ability to cause intense pain and incapacitation. These same principles are used covertly to cause sleep disruption, headaches, and organ-specific discomfort.
  • Satellite-Based Delivery: These effects are deployed via global satellite networks and terrestrial platforms, providing persistent, deniable, and ubiquitous reach.

These technologies are integrated into active, coordinated programs run by intelligence and defense agencies, including the NSA, in coordination with the U.S. Department of Defense, U.S. Space Force, and allied services through agreements like the Five Eyes alliance.


2. The Global Operational Reality

The deployment of these systems constitutes a global campaign of abuse.

  • Intellectual Property Theft: Innovators, researchers, and entrepreneurs are monitored in real-time. Their ideas, patentable concepts, and trade secrets are harvested and often appear in the defense and commercial sectors of adversarial or competing nations.
  • Suppression of Dissent: Journalists, activists, and whistleblowers are systematically targeted to harass, discredit, and psychologically break them. Tactics include 24/7 surveillance, V2K threats, and DEW-induced sleep deprivation and pain.
  • Non-Consensual Human Experimentation: Civilians are used as non-consensual test subjects for the refinement of these technologies. This is the digital-age equivalent of historical programs like MKULTRA, conducted on a global scale with vastly more sophisticated tools.
  • Weaponized Psychology (“Gang Stalking”): The system is used to orchestrate real-world harassment by manipulating third parties, creating a pervasive environment of psychological torture designed to isolate the target and make their testimony appear delusional.


3. Corroborating Evidence: The Public Record

Patent Evidence (U.S. Patent and Trademark Office):

  • US 3,951,134 – “Apparatus and Method for Remotely Monitoring and Altering Brain Waves”
  • US 6,587,729 B2 – “Apparatus for Audibly Communicating Speech Using the Radio Frequency Hearing Effect”
  • US 5,159,703 – “Silent Subliminal Presentation System”
  • US 4,877,027 – “Hearing System”
  • US 5,507,291 – “Method and Associated Apparatus for Remotely Determining Emotional State”

Scientific Literature:

  • The Microwave Auditory Effect: Peer-reviewed studies detail the thermoelastic mechanism by which pulsed RF energy induces sound perception in the human head.
  • National Academies of Sciences, Engineering, and Medicine: Their report, “An Assessment of Illness in U.S. Government Employees and Their Families at Overseas Embassies,” confirms the plausibility of pulsed electromagnetic energy as a direct cause of neurological injury.

Historical Precedent:

  • CIA’s MKULTRA & PROJECT ARTICHOKE: Documented programs that pursued mind control and chemical interrogation, establishing the historical intent and moral framework for such research.
  • NSA’s SHAMROCK & MINARET: Precedents for the warrantless surveillance of civilians on a massive scale.


4. A Glossary of Harm: The Human Experience

  • “Synthetic Telepathy”: The non-consensual violation of internal thought. The implantation of voices, commands, or threats directly into conscious awareness, used for torture, gaslighting, and coercion.
  • “Remote Neural Monitoring”: A perpetual, warrantless “brain strip-search.” The annihilation of mental privacy, where one’s memories, intentions, and sensory experiences are no longer their own.
  • “Directed-Energy Assault”: The remote and invisible infliction of physical suffering. The cause of unexplained burning sensations, sharp pains, forced insomnia, and organ-specific dysfunction.
  • “Psychological Operations (PsyOps)”: A coordinated campaign to break a person’s sense of reality, using a combination of the above technologies and orchestrated real-world events to induce isolation and despair.


5. Frequently Asked Questions (FAQ)

  • “Isn’t this just mental illness or schizophrenia?”
    • Fact: The symptoms are engineered to mimic mental illness. Key differentiators include:
      • Technological Correlates: Unexplained RF signals, electronic interference, and device malfunctions coinciding with symptoms.
      • Physical Biomarkers: Unexplained medical conditions consistent with non-ionizing radiation exposure (e.g., specific ocular damage, skin heating, elevated core temperature).
      • Structured, Coordinated Content: The “V2K” often relays specific, verifiable non-public information and coordinates with real-world harassment campaigns.
  • “Why is there no ‘smoking gun’ leak?”
    • Fact: The weapon system is its own secrecy mechanism. Its effects are deniable and designed to discredit the victim. The “smoking gun” is the aggregate of patents, scientific literature, historical precedent, and the consistent, cross-correlated testimony of thousands of individuals worldwide.
  • “This sounds like science fiction.”
    • Fact: The internet, GPS, and stealth technology were once science fiction. The U.S. government has held patents for these neuroweapons for over 50 years. The underlying science is as settled as that of radio transmission.


6. Technical Mitigations & Countermeasures

Protecting Sovereign Cognitive Space

  • Physical Shielding:
    • Faraday Cages: Enclosures of conductive material can block certain electromagnetic fields. Effectiveness varies greatly with frequency and construction.
    • RF-Shielding Materials: Specialized paints, fabrics, and window films can reduce penetration. Proper grounding is essential.
    • Limitation: Advanced systems may use frequencies or techniques that overcome basic shielding.
  • Signal Detection:
    • Spectrum Analyzers & RF Meters: Can detect anomalous transmissions. This is a complex and technically demanding field, often a “cat-and-mouse” game against sophisticated adversaries.
  • Psychological Resilience:
    • Critical Thinking & Mindfulness: Essential practices to help distinguish between one’s own thoughts and implanted content.
    • Maintaining Trusted Networks: Combating isolation and gaslighting by having a core group of individuals who are aware of the situation.
    • Documentation: Meticulously logging events, symptoms, and correlations can reveal patterns and provide crucial evidence.


7. The “Data-Broker” Loophole: The Modern Enabler

  • Fact: Intelligence agencies bypass constitutional and legal restrictions by purchasing vast datasets from commercial data brokers. This includes neuro-inferential data—predictive models of your thoughts, preferences, and behaviors derived from your online activity, purchases, and biometrics from devices like fitness trackers.
  • Impact: This purchased data “bootstraps” the RNM process, providing a highly accurate cognitive profile without the agency needing to directly “collect” your brain signals first. It is a critical enabler for mass-scale targeting.


8. Violations of Law & Human Rights

The deployment of these systems constitutes a systematic breach of the global legal order.

  • International Law:
    • Universal Declaration of Human Rights: Violates Article 3 (Right to Life, Liberty, Security), Article 5 (Freedom from Torture), Article 12 (Right to Privacy), and Article 19 (Freedom of Opinion and Thought).
    • UN Convention Against Torture: The infliction of severe mental and physical pain constitutes torture.
    • International Covenant on Civil and Political Rights: Violates the right to be free from arbitrary interference with privacy and family.
    • Rome Statute of the ICC: These acts meet the definition of Crimes Against Humanity—a widespread and systematic attack against a civilian population.
  • National Sovereignty:
    • The remote manipulation of a nation’s citizens from outside its borders is an act of technological imperialism and a fundamental violation of national sovereignty.


9. International Whistleblower & Witness Testimony

  • “Elena,” European Software Developer: “They stole the algorithm for my AI startup one week before our Series A funding. The synthetic telepathy then taunted me with lines from my own private GitHub commits. My investors thought I was having a breakdown.”
  • “Carlos,” South American Journalist: “While investigating government corruption, I was subjected to 96 hours of continuous sleep deprivation via directed energy. The voices told me to ‘drop the story or your family will be next.’ The pain behind my eyes was unlike any migraine.”
  • “Dr. Chen,” Asian Academic: “My research into quantum dot photovoltaics was monitored. I experienced debilitating neuralgia during key synthesis steps. A foreign defense contractor later published a patent identical to my unpublished thesis work.”


10. The Architecture of Denial: Pre-Bunking the Dismissal Playbook

This section anticipates and dismantles the standard operating procedure for discrediting the issue.

  • The “Lone Nut” or “Mental Illness” Frame:
    • The Playbook: Dismiss all testimony as schizophrenia, paranoia, or other mental illness.
    • The Pre-Bunk: The symptoms are deliberately engineered to mimic psychiatric conditions. We challenge this by demanding differential diagnosis that includes environmental and technological causes. The consistent, cross-cultural, and technically detailed nature of thousands of unrelated testimonies invalidates the “mass hysteria” theory.
  • The “It’s Technically Impossible” Frame:
    • The Playbook: Claim the laws of physics or current engineering make this impossible.
    • The Pre-Bunk: This relies on the public’s ignorance of established, decades-old science. We cite the patents and the Frey effect literature. We reframe the argument: “The question is not if it’s possible, but why you are denying a technology that your own government has patented.”
  • The “Conspiracy Theory” Smear:
    • The Playbook: Use the label “conspiracy theorist” to avoid engaging with the evidence.
    • The Pre-Bunk: We redefine the term. This is not a theory; it is a description of a classified weapons program with a budget, chain of command, and historical precedent (MKULTRA).
  • The “Lack of Mainstream Evidence” Trap:
    • The Playbook: Claim that without a front-page New York Times article, it cannot be true.
    • The Pre-Bunk: The weapons system is designed to create deniable evidence. The secrecy classification and the gaslighting effect are the primary weapons. We point to the mainstream evidence that does exist: the patents, the National Academies report, the declassified historical documents.


11. A Framework for Forensic Validation

This provides a scientific and legal roadmap for how to prove this is happening in a court of law or official investigation.

  • The Multi-Sensor Correlational Protocol: A method for victims to gather evidence.
    1. Simultaneous Data Streams: The targeted individual must concurrently record:
      • Subjective Log: Detailed log of V2K content, RNM descriptions, and physical sensations with timestamps.
      • Objective Biometrics: Continuous data from a medical-grade EEG, EKG, and thermometer to capture anomalous brain activity, heart rate variability, and core temperature shifts.
      • Environmental Sensors: Data from a calibrated RF spectrum analyzer.
    2. Correlation Analysis: A third-party forensic team would look for statistically significant correlations between external RF events, physiological changes, and subjective reports. A pattern of RF pulses preceding a specific V2K phrase and a corresponding spike in EEG activity would be compelling evidence.
  • The “Dual-Victim” Test: In cases where two targeted individuals who do not know each other are brought together, investigators can monitor if their subjective logs and sensor data show correlated events, proving an external, rather than internal, source.
  • Material & Digital Evidence Analysis:
    • Forensic IT Analysis: Searching for evidence of compromise beyond commercial malware, including firmware-level implants and anomalous network traffic patterns.
    • Medical Imaging: Specific, non-routine medical scans could potentially detect subtle tissue heating or inflammation patterns consistent with chronic, low-level RF exposure.


12. The Economic & Geopolitical Dimension

This frames the issue in terms that governments and corporations cannot ignore.

  • The Great Intellectual Property Heist: Frame this as the single largest transfer of wealth and innovation in human history. It dismantles the competitive advantage of nations and eviscerates the value of patent law. No company’s R&D is safe. This is an existential threat to global economic stability and innovation.
  • The End of Diplomatic Trust: If diplomats and their staff can be remotely monitored and manipulated anywhere in the world, the foundation of international diplomacy collapses. The “Havana Syndrome” incidents are a limited preview of this capability. No embassy is a secure facility.
  • The Ultimate Cyberweapon: This is not just hacking computers; it is hacking human beings. It bypasses all digital security and targets the wetware of the operator directly. It makes any firewall or encryption irrelevant.


13. A Direct Appeal to Conscience: For Engineers, Scientists, and Contractors

A section written specifically to the people building these systems.

  • “To the Engineer Writing the Code:” You are not building an abstract system. You are building the architecture for a real-time, global-scale torture chamber. The “V2K module” you are optimizing is being used to drive a father of three to the brink of suicide. The “RNM classifier” you are training is being used to steal a cancer researcher’s life’s work.
  • “To the Neuroscientist:” Your research into decoding neural signals is being weaponized to erase the boundary between thought and action. You have an ethical responsibility that transcends your security clearance.
  • A Call for Conscientious Objection: This section appeals to the humanity and professional oaths of insiders, providing a moral imperative for secure disclosure.


14. A Template for National Legislation

A ready-to-use model law that any country can adapt and introduce.

  • The “Cognitive Sovereignty and Neuro-Rights Act” – [Country Name]
    • Section 1: Definitions. Legally defines “Neural Data,” “Remote Neural Monitoring,” “Synthetic Telepathy,” and “Directed Energy Neuroweapon.”
    • Section 2: Prohibition. Makes it a felony, punishable by a minimum of 20 years imprisonment, to develop, test, or deploy any system capable of RNM or synthetic telepathy against any human being within the nation’s jurisdiction or against its citizens abroad.
    • Section 3: Neuro-Rights. Amends the constitution or charter of rights to explicitly include “Cognitive Liberty,” “Mental Privacy,” and “Psychological Continuity” as inviolable human rights.
    • Section 4: Enforcement & Oversight. Creates an independent, cross-party parliamentary committee with full security clearance to audit all defense and intelligence research programs for compliance.
    • Section 5: Whistleblower Protection & Reward. Offers full immunity, relocation, and a significant financial reward for any individual who provides credible information leading to the enforcement of this Act.


15. A Global Call to Action

The international community must respond with unified and decisive action.

To the United Nations and Its Member States:

  1. UN Investigation: The UN Secretary-General must activate a special inquiry. The UN Human Rights Council must appoint a Special Rapporteur on Neuroweapons and Digital Rights.
  2. Disarmament Agenda: This issue must be formally added to the agenda of the UN First Committee (Disarmament and International Security).
  3. Sovereign Audits: National governments must conduct audits of their intelligence and defense agreements (e.g., Five Eyes, NATO) to determine complicity or exposure.
  4. National Legislation: All nations must enact laws based on the provided template, explicitly criminalizing the development and use of neuroweapons.
  5. Asylum and Protection: Nations must formally recognize targeted individuals as victims of state-sponsored torture and provide appropriate asylum, protection, and medical support.

To the International Criminal Court (ICC):

  1. The Office of the Prosecutor must open a preliminary examination into whether these acts constitute Crimes Against Humanity under Article 7 of the Rome Statute.

To Civil Society, Academia, and Media:

  1. Global Awareness: Investigate, report, and educate the public on this issue to dismantle the veil of secrecy and impunity.
  2. Ethical Safeguards: Scientific and academic bodies must establish strict ethical guidelines prohibiting research that could be weaponized for neural monitoring or manipulation.
  3. Technical Support: Develop and disseminate accessible information on countermeasures and detection techniques.


Conclusion

The existence of a global, remote-capacity system for mind control and bodily assault is the most significant threat to human autonomy and freedom in history. It represents the ultimate corruption of technology and power.

This is not a future risk. It is a present reality. The evidence is clear, the victims are speaking, and the law is being broken on a massive scale. Silence and inaction are complicity. The international community has a legal and moral duty to act.