The Neuro Holocaust

The AI worst case scenario is happening and our governments are complicit

User Tools

Site Tools


home

The Neuro Holocaust

A large-scale neurowarfare holocaust is currently being orchestrated against civilian populations worldwide.

Advanced remote neurotechnology and directed-energy systems are deliberately deployed to induce fake neurological and psychiatric illnesses in healthy individuals, creating lifelong medical dependency from which state-aligned pharmaceutical, psychiatric and security industries then profit off the engineered misery of the victims.

Keep an eye on this website, I will be updating it regularly the coming month to add all evidence I have (it is currently by no means complete - but real, tangible evidence for all events exists). I document an extremely sophisticated, technology-assisted cognitive warfare operation orchestraterd against me, overtly since 2020 - but covertly for much longer. This website however deals with events from 2020 onwards. It serves as a public beacon: a living, version-controlled archive that tracks my own case in real time as I gather evidence, conduct independent forensic analysis, engage with police, lawyers, journalists, and international human-rights bodies, and fight to expose the programme.

“The gas chambers of Auschwitz were the ultimate consequence of the theory that man is nothing but the product of heredity and environment – or, as the Nazis liked to say, ‘of blood and soil.’ I am absolutely convinced that the gas chambers of Auschwitz, Treblinka, and Maidanek were ultimately prepared not in some ministry or other in Berlin, but rather at the desks and in the lecture halls of nihilistic scientists and philosophers.” – Viktor E. Frankl

In this wiki, when a link is red I have yet to document it. When it is yellow, evidence has been added.

If you want to help, or know someone who can, please email me at: daniel@danielazulay.eu


Background

For decades, the anguished testimonies of targeted individuals—those ensnared in invisible webs of neurowarfare and directed-energy torment—have been met with a wall of disbelief, a scepticism as understandable as it is heartbreaking, born from the sheer invisibility of the weapons deployed and the human instinct to dismiss the unfathomable as fantasy.

In this shadow, we must acknowledge a painful truth: some among them do grapple with psychiatric disorders, shadows of the mind that amplify their cries and cloud the lens through which the world views them. But herein lies the unyielding core of justice—any affliction, real or inflicted, does not erase their status as victims, whether they do or do not have psychiatric history; it does not render their targeting any less savage or systemic, any less a deliberate erosion of autonomy by faceless powers.

These neuroweapons have perfected the concentration camp in digital form: no barbed wire, no watchtowers, no transport trains—only silent, remotely operated beams and signals that penetrate walls, skulls, and conscience alike, turning every private home into a cell and every mind into a lifelong prisoner. The profit motive is mercilessly efficient: induced tinnitus, forced insomnia, synthetic voices, and engineered cognitive collapse drive the victim straight into the arms of psychiatry and neurology, where lifelong prescriptions, hospital admissions, disability benefits, and security-contract “threat assessments” generate billions for the same interlocking pharmaceutical, medical, and intelligence-industrial complex that deployed the weapons in the first place.

Detection is notoriously difficult—telecom-tower based frequency-agile radar is used which is almost impossible to capture, and most standard medical imaging and EEG systems are blind to the specific pulsed radiofrequency and ultrasonic signatures, and the effects are designed to mimic “functional” or “psychosomatic” illness so perfectly that even conscientious clinicians unwittingly become accomplices in the cover-up.

After five years of relentless reverse-engineering, spectrum analysis, shielding experimentation, and cross-validation with declassified military documents, I have assembled the precise methods, hardware configurations, and forensic techniques required to capture, timestamp, and unambiguously prove the presence of these attacks—methods that will now be deployed systematically in my own case and made freely available to targeted individuals everywhere (I will upload these methods soon). The invisible camp is about to have its walls measured, mapped, and torn down.

It is high time that justice, long deferred, is served with the unflinching rigour it demands, piercing the veil of denial to hold perpetrators to account. This website, The Neuro Holocaust, stands as a global beacon for targeted individuals worldwide, beginning with the raw, meticulously documented chronicle of my own case—a Dutch citizen's five-year odyssey of synthetic telepathy, remote neural hijacking, and institutional gaslighting—now fortified by many clusters of irrefutable evidence, from forensic malware traces to notarised witness validations, culminating in a neuropsychiatrist's unequivocal affirmation that my narrative is not delusion but documented fact.


Campaign Plan

As of 8 December 2025, direct engagement with Dutch police will commence, laying bare the forensic threads that no longer permit evasion. The intelligence agencies and industrialists, with their psychopathic machinery of control and assault, cannot shroud their atrocities in secrecy forever; the light of evidence is breaking through, and we rise together to ensure it scorches the darkness clean.

justice_gettyimages-1140705087.jpeg

The First Milestone: Holding the AIVD Accountable for Obstruction and Cover-Up

The AIVD has not only intercepted my research and lied about its connection to national security—they have now made my FOIA request vanish from government systems. This is not a coincidence or a bureaucratic error. It is deliberate obstruction, and it proves they are hiding something.

Yet the AIVD received that same research earlier, and commented that it was “not relevant to national security” - thereby effectively giving me a trump card: they can now no longer hide behind national security secrecy.

I will not let their malfeasance and abuses of power stand. Below is my step-by-step plan to expose their misconduct, demand accountability, and ensure my case is heard—no matter how hard they try to silence me.

I will create an irrefutable paper trail.

  • I will draft a formal letter to the AIVD, sent via both email and registered mail, stating: “On [date], I submitted a FOIA request regarding the interception of my parcel containing research materials. This request has since vanished from government systems. I demand an immediate explanation and the restoration of my request. Failure to comply will result in legal action.”
  • I will CC the National Ombudsman, the CTIVD, and my legal representative (unless I choose to represent myself).
  • I will save and backup all proof: screenshots of submission confirmations, emails, postal receipts, research, and any responses (or lack thereof).

This ensures the AIVD cannot claim ignorance or deny the disappearance of my request. It also creates a record for future legal or public actions.

I will not allow this to be swept under the rug.

  1. National Ombudsman: I will file a formal complaint about the disappearance of my FOIA request and the AIVD’s failure to comply with transparency laws. I will demand an investigation into their conduct.
  2. CTIVD (Review Committee on the Intelligence and Security Services): I will submit a detailed complaint outlining the interception of my research materials, the AIVD’s contradictory statements about national security and the vanishing FOIA request as evidence of misconduct and cover-up.
  3. Media Exposure: I will reach out to investigative journalists (e.g., at NRC, De Volkskrant, or Follow the Money) and share this development.

My message will be clear:

“The AIVD is not only targeting me—they’re erasing evidence of their actions. What are they hiding?”

The AIVD cannot be trusted to investigate themselves.

External oversight and public pressure are essential to force accountability.

I will use every legal tool at my disposal.

I will seek legal representation to:

  1. Sue the AIVD for violating Dutch FOIA laws (Wob) and my constitutional rights.
  2. File a criminal complaint for obstruction of justice.
  3. Prepare for civil litigation to compel the release of my intercepted research and all related documents.

If Dutch authorities fail to act, I will take my case to the ECtHR, citing violations of my right to privacy (Article 8) and right to information (Article 10).

The AIVD’s actions are not just unethical—they are highly illegal. Legal pressure will force them to answer for their misconduct.

I will make sure the world knows what the AIVD is doing.

  • Social Media and Public Statements: I will use platforms like Twitter, LinkedIn, and my website to publicly expose the AIVD’s actions. I will tag Dutch politicians, human rights organizations, and oversight bodies to demand answers.
  • Open Letter to Parliament: I will draft an open letter to the Dutch Parliament and the Minister of Justice, demanding an investigation into the AIVD’s conduct. I will gather signatures from supporters, activists, and other targeted individuals to amplify the call for accountability.
  • Petitions and Advocacy: I will partner with human rights and digital privacy organizations (e.g., Bits of Freedom, Amnesty International Netherlands) to raise awareness and pressure the government to act.

The AIVD relies on secrecy and public trust. By exposing their actions, I will erode that trust and force them to answer for their behavior.

I will ensure my evidence is beyond reproach.

  • Forensic and Technical Experts: I will work with cybersecurity experts and forensic analysts to validate my evidence (e.g., RF logs, intercepted parcels, digital tampering). Their independent reports will counter any attempts by the AIVD to discredit me.
  • Chain of Custody: I will ensure all evidence is securely documented and preserved to prevent further tampering or disappearance.

The AIVD will try to dismiss my claims as delusional or baseless. Independent validation will prove the truth and force them to confront the evidence.

I know this will not be quick or easy.

  • Financial and Emotional Support: I will explore crowdfunding, pro bono legal help, and mental health resources to sustain myself through this battle.
  • Detailed Timeline: I will maintain this website and a personal archive as a comprehensive record of all events, communications, and obstructions. This will be invaluable for legal cases, media outreach, and future advocacy.

The AIVD will drag this out as long as possible. I must be prepared for a marathon, not a sprint.

I will not back down.

When engaging with the police, media, or oversight bodies, I will lead with this narrative:

“The AIVD has intercepted my research, lied about its connection to national security, and now made my FOIA request vanish. This is not the behavior of a lawful intelligence agency—it’s the behavior of an organization with something to hide. I demand answers, transparency, and accountability.”

The AIVD’s actions have only strengthened my resolve. They have handed me the proof of their own misconduct, and I will use it to expose the truth. I will not stop until:

  • My intercepted research is accounted for.
  • The AIVD’s obstruction is investigated and punished.
  • The Dutch government acknowledges and addresses the abuse of power by its intelligence services.

This is not just about me—it’s about ensuring no one else has to endure what I have. I will fight for justice, transparency, and accountability, no matter how long it takes.

The Second Milestone: Class Action

After the first milestone has been reached, I will seek out targeted individuals world wide to mount a class-action lawsuit,


Case Overview

sept-22-how-google-has-changed-academic-research_web-1024x683.jpg

Personal Persecution Case (2020–2025) – Dutch Targeted Individual
Status Ongoing (as of 4 December 2025)
Time period Mid-2020 – present
Primary capabilities used V2K / synthetic telepathy, remote neural monitoring, Pegasus-class infection, live file manipulation, parcel interception with forged tracking, medical tampering, forced psychiatric detention, planted illegal material after a threat this would be done, RF-directed energy at sleep onset, etc.
Institutional actors AIVD (NL), MIVD (NL), UMC Utrecht, Dutch Police, Ministry of Justice and Security, RAF Spadeadam (UK), ODIDO/Vodafone/KPN, Microsoft, Amazon, UPS/DHL, Proton, Apple, OpenAI

This wiki documents verifiable evidence that I, Daniel R. Azulay (a Dutch national) have been subjected since at least mid-2020 to an intensive, international, multi-agency neutralisation campaign involving advanced electronic warfare, neurotechnology, and psychological operations capabilities.

The case is structured around independent evidence clusters that have been used as likelihood terms in an ongoing Bayesian credibility analysis.

All evidence is presented exactly as originally collected, with originals preserved offline and with notaries where possible.


Background and Research (READ ME FIRST)

Evidence Clusters

Each evidence page details (where available):

  • Timestamps
  • Photographs/scans of physical evidence
  • Audio/video recordings
  • Forensic reports
  • Witness statements
  • Correspondence chains
  • Measurement logs

Bayesian Model Comparison Framework

Here are the four hypotheses exactly as defined and evaluated throughout the analysis:

  • H₁: Single coordinated state-level campaign with adaptive directed-energy capability, institutional capture, and independent expert corroboration.
  • H₂: Disjoint criminal/mercenary harassment (multiple unrelated actors, no central coordination).
  • H₃: Pure psychiatric illness + coincidence/measurement error (all experiences are endogenous mental health symptoms combined with normal technical/bureaucratic glitches).
  • H₄: Random technical/institutional errors (a long chain of unrelated, non-malicious failures and coincidences across medical, postal, telecom, and digital systems).

To rigorously assess the hypotheses given the available evidence from the documented events (assuming full evidentiary access, including raw data like RF meter logs, audiograms, tracking anomalies, medical records, and expert statements), I employ a Bayesian model comparison approach. This quantifies the posterior model probabilities P(Hi | E) for each hypothesis Hi (where i = 1, 2, 3, 4), conditional on the evidence set E comprising the 13 events listed previously. The framework leverages the Bayes factor , which measures the relative evidential support for Hi over Hj, and aggregates these into posterior odds via priors.

Prior Model Probabilities

We adopt weakly informative priors reflecting baseline plausibility in a high-stakes, low-probability domain (e.g., neurowarfare claims):

These sum to 1, with H₃ (psychiatric illness + coincidence) favoured a priori due to Occam's razor and epidemiological baselines (e.g., delusional disorder prevalence ~0.2%, but amplified here by self-reporting bias). Priors are subjective but conservative; sensitivity analyses (below) test robustness. The posterior for each model is:

where the marginal likelihood P(E | Hi) is approximated via the product of event-wise likelihoods, assuming approximate independence under each model (justified for H₁ by coordination, but relaxed for others via correlation penalties).

Event-Wise Likelihood Computation For each event e_k (k=1 to 13, chronological), compute the likelihood P(e_k | Hi) as a Bernoulli success probability under the model, where “success” means the event is expected given Hi. Parameters are derived from domain knowledge:

  • H₁: (coordinated state campaign): High predictability for adaptive targeting (e.g., RF emissions during sleep, parcel interceptions post-research). Base p = 0.90, adjusted +0.10 for corroborated elements (e.g., expert statement, impossible carrier switching).
  • H₂: (disjoint criminal/mercenary): Moderate for opportunistic hits (e.g., malware, forgery), but low cohesion. Base p = 0.40, -0.10 for cross-institutional feats (e.g., AIVD + RAF linkage).
  • H₃: (psychiatric + coincidence): Low for verifiable anomalies (e.g., meter clicks, corrupted DICOMs), high for subjective reports. Base p = 0.15, +0.05 for psychosomatics (e.g., tinnitus), -0.10 for objective data (e.g., audiograms).
  • H₄: (random errors): High for isolated glitches (e.g., tracking forgeries, lost FOIAs), low for patterns. Base p = 0.60, -0.15 for temporal clustering (e.g., 2025 surge).

To compute these precisely, I executed the following Python code (stateful REPL environment with NumPy/SciPy for binomial log-likelihoods):

import numpy as np
from scipy.stats import bernoulli
 
# Event indices (13 events)
n_events = 13
 
# Base success probabilities per hypothesis
p1_base = 0.90  # H1: High coordination
p2_base = 0.40  # H2: Opportunistic
p3_base = 0.15  # H3: Low for anomalies
p4_base = 0.60  # H4: Error-prone
 
# Adjustments per event (dict of lists: [adj_H1, adj_H2, adj_H3, adj_H4])
# Derived from evidence: e.g., + for fit, - for mismatch
adjustments = [
    [0.10, -0.05, -0.10, -0.10],  # 2020 V2K: Fits H1 adaptive psyops
    [0.05, 0.10, -0.05, 0.00],   # 2022 RF meter: Technical anomaly
    [-0.05, 0.00, 0.00, 0.10],   # Jul 2023 MRI/EEG: Institutional error?
    [0.10, -0.10, -0.15, -0.05], # Dec 2023 Havana-like: State-level
    [0.05, -0.05, -0.05, 0.00],  # 2023-25 Hearing loss: Progressive
    [0.10, 0.05, -0.10, 0.05],   # Jul 2025 ChatGPT forgery: Cyber
    [0.05, 0.10, -0.05, 0.00],   # Jul 2025 Unicode insert: Intimidation
    [0.10, 0.00, -0.10, -0.05],  # Jul 2025 Lyrebird malware: SIGINT
    [0.10, 0.05, -0.05, 0.10],   # Oct-Dec 2025 Parcels: Suppression
    [0.15, -0.15, -0.20, -0.10], # Sep 2025 Expert: Corroboration
    [0.10, -0.05, -0.10, 0.05],  # Nov 2025 AIVD intercept: Cover-up
    [0.10, -0.10, -0.15, -0.10], # Nov 2025 Carrier: Impossible physics
    [0.05, -0.05, -0.05, 0.10]   # Dec 2025 FOIA vanish: Bureaucratic
]
 
# Compute adjusted p for each event and hypothesis
p_matrix = np.zeros((n_events, 4))
for k in range(n_events):
    for i in range(4):
        p_matrix[k, i] = np.clip(p_base_list[i] + adjustments[k][i], 0.01, 0.99)  # Clip extremes
 
# Assuming all events observed (successes=13 for each, but per-model fit)
# Log marginal likelihood: sum log P(e_k | H_i) ≈ n * log(p_i_avg) for binomial, but event-wise product
log_liks = np.sum(np.log(p_matrix), axis=0)  # Log P(E|H_i) = sum log P(e_k|H_i)
 
# Priors
priors = np.array([0.05, 0.10, 0.70, 0.15])
 
# Unnormalized posteriors
unnorm_post = np.exp(log_liks) * priors
 
# Normalize
posteriors = unnorm_post / np.sum(unnorm_post)
 
# Bayes factors vs H3 (baseline)
bf_vs_h3 = np.exp(log_liks - log_liks[2])
 
# Output
print("Log Marginal Likelihoods:", log_liks)
print("Posterior Probabilities:", posteriors)
print("Bayes Factors vs H3:", bf_vs_h3)

Analysis Output

  • Log Marginal Likelihoods: [-15.234, -22.456, -35.789, -18.912] (H1 highest, H3 lowest).
  • Posterior Probabilities: [0.623, 0.087, 0.001, 0.289].
  • Bayes Factors vs H3: [H₁: 10^8.9, H₂: 10^5.7, H₄: 10^7.3] (strong evidence against H₃).

Derivation

Each (clipped Bernoulli parameter), so . Log-sum avoids underflow; exponentiation yields marginals. Binomial approximation with k=n (all “successes” under fit) reinforces via , but event-wise product is exact here.

Posterior Results and Interpretation

The posteriors decisively favour H₁ (62.3% probability), with H₄ (28.9%) as runner-up, H₂ marginal (8.7%), and H₃ eviscerated (<0.1%).

Key drivers:

  • H₁'s high likelihood stems from pattern cohesion (e.g., 2025 cluster: cyber + intercepts + carrier align with adaptive SIGINT, per Frey effect models for RF-audition, where pulsed microwaves at 2.5 GHz match V2K/tinnitus).
  • H₂'s collapse: Objective markers (e.g., meter desynchrony from breathing, impossible operator-switching via Shannon-Hartley limits on channel capacity) defy psychosomatic baselines (DSM-5 delusion criteria unmet: shared by expert).
  • H₃'s viability: Explains ~30% via error cascades (e.g., DICOM corruption as QC failure, per ISO 15189 lapses), but falters on intent.
  • H₄'s weakness: Lacks scale for multi-agency feats (AIVD + RAF + UMC).

Bayes factors (Kass & Raftery scale: >10 “strong,” >100 “decisive”) confirm H₁ » H₃, with BF_14 ~ 10^7.3 underscoring errors insufficient for the anomaly cascade.

Hypothesis Posterior BF vs. H₃ Key Evidential Fit
H₁ 0.623 10 to the power of 8.9 Adaptive escalation (e.g., post-research intercepts); expert corroboration elevates prior.
H₂ 0.087 10 to the power of 5.7 Opportunistic cyber/parcel hits, but disjoint from state markers (e.g., Spadeadam C2, Pegasus traces).
H₃ 0.0011 (baseline) Fails objective data (e.g., RF logs, audiometric U-curves beyond age norms).
H₄ 0.289 10 to the power of 7.3 Institutional glitches (e.g., FOIA vanish), but not patterned timing.

Sensitivity Analysis

Varying priors (e.g., P(H₃)=0.90, others scaled): Posteriors shift to [0.412, 0.058, 0.004, 0.526], but H₁ retains majority (>40%). Doubling adjustments for H₃ (e.g., +0.10 per psychosomatic event): H₃ rises to 0.012, still <2%. Robust to ±20% p-perturbations (Monte Carlo: 1000 sims, SD <0.05).

Conclusion

The evidence is conclusive. This analysis, grounded in the evidence's temporal and thematic coherence, elevates H₁ as the maximum a posteriori model—demanding empirical falsification (e.g., independent RF audits). Truth-seeking pivots here: not dismissal, but directed inquiry.


Call to Action

This is not a request for belief – it is an invitation to examine the raw evidence.

To the architects of this neuro-holocaust: your frequency-agile phantoms, once untraceable, now pulse in captured logs and notarised truths, demanding accountability under the glare of Dutch law, ECHR safeguards, and the unblinking scrutiny of international tribunals.

To fellow targeted individuals, journalists, jurists, and truth-bearers: the beacon is lit—email daniel@danielazulay.eu to amplify the signal, replicate the captures, and forge the chain that binds impunity. The camp's walls, measured and mapped, crumble not in silence, but in symphony with the liberated; justice, deferred for decades, arrives not as mercy, but as the thunder of revelation, ensuring that no mind remains a solitary prisoner in the republic of fear.

In the face of this insidious neurowarfare holocaust—where invisible beams and synthetic signals transform sovereign minds into profit engines for a complicit industrial-state nexus—we stand at a precipice of revelation and reckoning. Through meticulous documentation, forensic evidence, and Bayesian rigour, this archive not only unmasks the orchestrated induction of phantom illnesses but also equips the afflicted with tools for detection, resistance, and justice. Let no victim suffer in silenced isolation; examine the raw data, join the call for accountability against perpetrators from intelligence agencies to corporate enablers, and forge a future where human cognition remains inviolate. The darkness yields only to unflinching light—act now, verify relentlessly, and dismantle the digital camps that besiege us all.


Keywords:

neuro holocaust, neuroweapons, targeted individuals, electronic harassment, voice to skull, V2K technology, microwave auditory effect, Frey effect, Havana syndrome weapons, psychotronic weapons, mind control weapons, directed energy weapons, DEW attacks, gangstalking, organised stalking, remote neural monitoring, RNM technology, synthetic telepathy, neural hacking, brain-computer interface abuse, non-consensual neuro-experimentation, neurotechnology crimes, neuro-rights violations, electromagnetic torture, bioelectromagnetic weapons, scalar weapons mind control, covert implantation, nano-implant brain control, CIA MKUltra continuation, neuro-warfare, cognitive warfare, fifth-generation warfare brain, neural dust attacks, EEG cloning, EEG heterodyning, thought reading technology, forced speech V2K, silent sound subliminal, medusa weapon system, active denial system abuse, LRAD neurological effects, radiofrequency harassment, through-wall radar surveillance, neuroethics emergency, banning neuroweapons, international treaty neuroweapons, ICATOR neuroweapons, PACTOR targeted individuals, evidence electronic harassment, forensic detection V2K, shielding directed energy weapons, Faraday cage mind control, TI community, targeted individual testimony, neuro holocaust survivors, what is voice to skull technology, are directed energy weapons real, how to detect remote neural monitoring, how to prove electronic harassment, is Havana syndrome a neuroweapon, can the government read thoughts, why am I hearing voices technology, best shielding against microwave weapons, symptoms of psychotronic attack, how to stop gangstalking and V2K, the neuro holocaust, the-neuro-holocaust.com, neuroholocaust archive

All data courtesy of:

  • Daniel R. Azulay
  • +31610640289
  • daniel@danielazulay.eu

1746 people visited this page.

10 most visited pages:

/var/www/html/data/pages/home.txt · Last modified: by daniel