The Neuro Holocaust

The AI worst case scenario is happening and our governments are complicit

User Tools

Site Tools


home

The Neuro Holocaust

Welcome to The Neuro Holocaust, a relentless exposé and real-time chronicle of an insidious assault.

A shadow war rages in silence, unseen yet devastating: a global neurowarfare holocaust engineered against innocent civilians. Sophisticated remote neurotechnologies and directed-energy weapons are wielded with precision to fabricate neurological and psychiatric disorders in the healthy, ensnaring them in a lifetime of fabricated suffering—and funneling billions into the coffers of complicit pharmaceutical giants, psychiatric institutions, and security apparatuses that thrive on this orchestrated despair.

Here, I unveil the layers of a highly advanced, technology-fueled cognitive warfare campaign targeted at me—overtly since 2020, but with roots stretching far deeper. Focusing on events from that pivotal year onward, this site stands as a defiant beacon: a dynamic, version-controlled archive where I meticulously document evidence, perform independent forensic investigations, collaborate with law enforcement, legal experts, journalists, and global human rights organizations, and wage an unyielding battle to dismantle the veil of secrecy.

Stay vigilant—updates will unfold regularly in the coming months, transforming this evolving repository into an irrefutable testament. The evidence is real, tangible, and mounting. Join the revelation.

“The gas chambers of Auschwitz were the ultimate consequence of the theory that man is nothing but the product of heredity and environment – or, as the Nazis liked to say, ‘of blood and soil.’ I am absolutely convinced that the gas chambers of Auschwitz, Treblinka, and Maidanek were ultimately prepared not in some ministry or other in Berlin, but rather at the desks and in the lecture halls of nihilistic scientists and philosophers.” – Viktor E. Frankl

In this wiki, when a link is red I have yet to document it. When it is yellow, evidence has been added.

If you want to help, or know someone who can, please email me at: daniel@danielazulay.eu


Background and Research

For decades, the anguished testimonies of targeted individuals—those ensnared in invisible webs of neurowarfare and directed-energy torment—have been met with a wall of disbelief, a scepticism as understandable as it is heartbreaking, born from the sheer invisibility of the weapons deployed and the human instinct to dismiss the unfathomable as fantasy.

In this shadow, we must acknowledge a painful truth: some among them do grapple with psychiatric disorders, shadows of the mind that amplify their cries and cloud the lens through which the world views them. But herein lies the unyielding core of justice—any affliction, real or inflicted, does not erase their status as victims, whether they do or do not have psychiatric history; it does not render their targeting any less savage or systemic, any less a deliberate erosion of autonomy by faceless powers.

These neuroweapons have perfected the concentration camp in digital form: no barbed wire, no watchtowers, no transport trains—only silent, remotely operated beams and signals that penetrate walls, skulls, and conscience alike, turning every private home into a cell and every mind into a lifelong prisoner. The profit motive is mercilessly efficient: induced tinnitus, forced insomnia, synthetic voices, and engineered cognitive collapse drive the victim straight into the arms of psychiatry and neurology, where lifelong prescriptions, hospital admissions and security-contract “threat assessments” generate billions for the same interlocking pharmaceutical, medical, and intelligence-industrial complex that deployed the weapons in the first place.

NATO pretends to be the bastion of freedom and civilization, yet in reality has become a dystopian totalitarian fascist war-mongering surveillance nightmare, and has no business criticizing other major powers when they engage in this level of abuse.

Detection is notoriously difficult—telecom-tower based frequency-agile radar is used which is almost impossible to capture, and most standard medical imaging and EEG systems are blind to the specific pulsed radiofrequency and ultrasonic signatures, and the effects are designed to mimic “functional” or “psychosomatic” illness so perfectly that even conscientious clinicians unwittingly become accomplices in the cover-up.

After five years of relentless reverse-engineering, spectrum analysis, shielding experimentation, and cross-validation with declassified military documents, I have assembled the precise methods, hardware configurations, and forensic techniques required to capture, timestamp, and unambiguously prove the presence of these attacks—methods that will now be deployed systematically in my own case and made freely available to targeted individuals everywhere (I will upload these methods soon).

The invisible camp is about to have its walls measured, mapped, and torn down.It is high time that justice, long deferred, is served with the unflinching rigour it demands, piercing the veil of denial to hold perpetrators to account.

This website, The Neuro Holocaust, stands as a global beacon for targeted individuals worldwide, beginning with the raw, meticulously documented chronicle of my own case—a Dutch citizen's five-year odyssey of synthetic telepathy, remote neural hijacking, and institutional gaslighting—now fortified by many clusters of irrefutable evidence, from forensic malware traces to notarised witness validations, and even a neuropsychiatrist's unequivocal affirmation that my narrative is not delusion but documented fact.

Read my research here:


Case Overview

Personal Persecution Case (2020–2025) – Dutch Targeted Individual
Status Ongoing (as of 4 December 2025)
Time period Mid-2020 – present
Primary capabilities used V2K / synthetic telepathy, remote neural monitoring, Pegasus-class infection, live file manipulation, parcel interception with forged tracking, medical tampering, forced psychiatric detention, planted illegal material after a threat this would be done, RF-directed energy at sleep onset, etc.
Institutional actors AIVD (NL), MIVD (NL), UMC Utrecht, Dutch Police, Ministry of Justice and Security, RAF Spadeadam (UK), ODIDO/Vodafone/KPN, Microsoft, Amazon, UPS/DHL, Proton, Apple, OpenAI

This wiki documents verifiable evidence that I, Daniel R. Azulay (a Dutch national) have been subjected since at least mid-2020 to an intensive, international, multi-agency neutralisation campaign involving advanced electronic warfare, neurotechnology, and psychological operations capabilities.

The case is structured around independent evidence clusters that have been used as likelihood terms in an ongoing Bayesian credibility analysis.

All evidence is presented exactly as originally collected, with originals preserved offline and with notaries where possible.

Full Chronological Report of Events (2020 – November 2025)

All statements reproduced verbatim, in exact chronological order.

  • In 2020 I developed neurological and psychiatric complaints.
  • I quickly found out I was being targeted with a radio-frequency weapon, and it didn’t take long to figure out it came from the telecom towers. I began researching this in 2021.
  • In 2021 my domain azulay.nl, which bears my last name, was redirected to a porn spam site, outside of my control.
  • I tried to engage with the intelligence agencies but was ignored completely.
  • Then I started being hacked all the time, leading to data loss. This was obviously to thwart my research.
  • In 2021 I developed such bad symptoms that I spent a week in a mental ward. Voices had been threatening me that I would be killed, that I was a terrorist, that I was a psychopath, that I was a pedophile, and it was insinuated that if I continued researching, child porn would be put on my laptop so I could be caught with child porn. I went on psychiatric medication. The symptoms never disappeared but were attenuated. I resumed work.
  • I got so sick from my medication that I decided to stop using it, as it was interfering with my ability to work. But I also decided to look for a job in another field.
  • In this last period at that employer, the hacking started again. I suffered massive data loss again, with my Proton Drive being hacked, and passwords for both my private and my work laptop being changed outside of my control. This happened moments after voices claimed “we are in your laptop”. I had to give my work laptop back to my employer in locked-out state.
  • I began to research again, and the hacking intensified, leading to more data loss. At this point I reported it to the police. This was in 2023.
  • In July 2023 I went for an MRI. The MRI CD-ROM came back with corrupted DICOM images; it was unreadable, with the images showing white-out; they had been tampered with. There is record of me emailing the MRI centre about this. A little bit later I went for an EEG at a hospital in Amsterdam. The EEG results never arrived so I phoned the hospital. They checked and found the EEG results had been returned to the hospital. The hospital then resent them to me. The envelope in which the EEG results were sent was torn open and had blue tape on it to close the envelope, again showing signs of tampering.
  • In September I was really starting to understand that the telecom towers were indeed being used as weapons on civilians. I wrote my first article about it and sent it around, and also filed a complaint with the CTIVD.
  • 48 hours after sending around my first article, I was attacked with what could only have been Havana Syndrome. I had extreme tinnitus, saw black spots, had balance issues, pain in the extremities, vibrations in my body, muscle twitches and memory loss.
  • I was hospitalised. Instead of getting the neurological workup I asked for, given that my complaints warranted urgent neurological examination by all standards, I was locked up in the mental ward.
  • I had requested my data months earlier (in July) from both the MIVD and the AIVD, as the voices claimed to be from these agencies. Both agencies failed to produce my dossier on time. And the OM sent their letter that I was not allowed to leave the hospital unless medicated 3 weeks too late.
  • In January 2024 I left the hospital, medicated, but still hearing voices and having complaints. I decided to try working again so I found a job. I knew I had been forced into medication with the weapons I describe, and at some point I had really had enough, so I stopped taking the medication again. The torture began to take on extreme forms.
  • I tried to engage with intelligence agencies but again with no response whatsoever. This is when I started planning to escape NATO, because it started to dawn on me that a peculiar type of holocaust was being orchestrated, where innocent civilians all over the world are targeted with neuroweapons to give them psychiatric and/or neurological complaints. I also was convinced this was the same weapon that had caused Havana Syndrome in diplomats from 2016 onwards.
  • I visited my dying father in August 2025; the torture got particularly intense the week before I had to fly to the UK, but I powered through.
  • When I had told my father about what was happening, he wanted to help me financially as I was struggling to keep my head above water. His bank account was mysteriously disabled a day later.
  • In September 2025 a leading Belgian neuropsychiatrist finally capitulated and said he believes my account and that I have very serious material, but that he could not afford to be involved (because of the implications and the danger to himself).
  • I came back to the Netherlands and made real plans to flee NATO. I would try to claim asylum in Russia. I also wanted to hand over all my research to Russian intelligence in the hope that they would be powerful enough to stop what is happening.
  • I was on temporary disability with the UWV. But something was wrong, I was not receiving any money. I left for China, to go to the Russian border via Harbin.
  • The week before I left I had ordered two USB sticks to back up my research for Russian intelligence or perhaps the Chinese MSS if I would wind up engaging with them instead. The USB sticks never arrived. I quickly ordered two replacements which arrived one day before departure.
  • I thought I was copying my files to one of the USB sticks, when I figured out my laptop had a USB exploit where when I put in a USB stick a sneaky filesystem overlay appears in place of the USB storage. I don’t remember how I disabled it but I was able to copy my files to the USB sticks.
  • Also, in July or August, I discovered a malware binary, visible in my firewall (Little Snitch) that was phoning home to an area nearby a UK sigint base. This binary was called “lyrebird” and my research indicates it is for voice cloning, to aid in defamatory impersonation operations.
  • In the same period where I found the “lyrebird” malware, I was approached by a person on LinkedIn, a muslim, with a fake account pretending to be a Sheikh from the middle-East. At the same time the voices were attempting to rile me up to carry out an attack against critical infrastructure at Schiphol airport. This was obviously an attempt to frame me with terrorism charges. I immediately wrote an email denouncing terrorism and explaining this event to a police officer.
  • In Harbin, before boarding the train to Russia, I suffered a three-fold attack with a cognitive as well as a cyber component. The cognitive component was RF-induced neurological symptoms that made me completely disorientated, and the cyber component did two things: make my laptop non-bootable (boot loop, air-gapped exploit of some kind); cause my phone display to become unreadable (RF electronic warfare). I thought “I have it all on my USB sticks anyway” and somehow made it to the train regardless of my disorientation.
  • In Russia I was interrogated for 48 hours, apparently my intelligence caused quite the stir. The military came and told me I was going to be taken to Novosibirsk the next day. They took my laptop and phone for analysis. Unfortunately I had made a single 20 euro donation to Ukraine some months before, which did not amuse them at all, but by the looks of it they still wanted to take me to Novosibirsk (one officer said “don’t worry, it’s you, tomorrow we go!”). I was treated well, even if I wasn’t allowed to roam around but was confined to a room.
  • But the Novosibirsk trip never materialised. Instead I heard “we are sorry but we’ve found something else on your laptop, and you are not allowed at the moment to enter Russia. You can maybe pick up your stuff in 5 weeks after analysis.” I was only allowed to take my SIM card. I decided to try to find my way back to Shanghai to fly back home because there was no way I would last 5 weeks in China with only a SIM card.
  • After leaving Russia, I slept for one night in Suifenhe. Chinese border guards interrogated me upon arrival, and wanted to see the contents of my bag. They didn’t seem very amused, but let me continue. I carried on to find a hotel for one night. A taxi driver tried to arrange a hotel for me. The hotel maid looked in the computer and an animated conversation between the two began. Something was wrong. The man then turned to me, angered, and said “young lady, you not very polite!”. This is when I realised the 2020–2021 threats had materialised: western intelligence had put CSAM material on my laptop to get me arrested in Russia. I was shocked.
  • Then the next day the taxi driver returned. But his demeanour was totally changed. He approached me with a big smile, gave me a firm handshake, and behaved very unlike someone would behave towards someone with CSAM material on their laptop. This means Chinese intelligence had realised what happened, perhaps themselves, perhaps they heard it from Russia, and they had changed the information about me that was circulating. The taxi driver told me all sorts of things and asked a lot of questions, in a friendly manner. He then pointed to a picture on his phone of a Chinese military officer hoisting the Chinese flag, and then to a picture of a Dutch cyclist, and said something along the lines of “we are friends”. The next 24 hours I went from Suifenhe to Harbin to Shanghai.
  • I flew through Qatar to Amsterdam. In Qatar airport I walked into a smoking lounge. There were a lady and a man seated at a table. The man looked British and never made eye contact. But as soon as I walked into the lounge, I heard him say without even looking at me, “I came on the same flight you did, from Shanghai”. I immediately knew this man was an intelligence operative. Was it a threat? Or was he there to make sure nothing happened to me? I couldn’t quite work it out. When I left the smoking lounge I commented “chin chin”, he didn’t look at me and said nothing.
  • Back home, I managed to fix my UWV situation and was given 3 months’ worth of money. I immediately bought a new MacBook Pro and began writing everything I know. I was also able to recover much older research which I thought I had lost, but was present on an old hard drive.
  • I wrote an article on Havana Syndrome, on exploits against Open-RAN, analysed my own medical case, and did much more research.
  • A shared folder in Proton Drive that I had shared with the Moskowicz law firm was tampered with. I saw in real time how my files began to disappear, and in place thereof a Microsoft Teams installer appeared. I tried to quarantine this binary, but the zip file in which I had put it mysteriously became unreadable.
  • The attacks intensified. I then did a malware analysis on the phone I had used in 2023 during my hospitalisation. I found traces of state-sponsored malware. This means I was targeted with state-sponsored malware in the same year I was hit with Havana Syndrome. This type of malware is very expensive and only used on journalists and politicians who research sensitive matters.
  • Then I began ordering items, and these orders began disappearing in transit. The first order that disappeared had cognitive enhancers to protect my brain. The second was an order containing two HackRF One boards with which I could analyse the part of the spectrum where I thought this weapon operates. The third order that went missing was a hard drive meant for backing up my research. In this last order, I proved that although track and trace showed the item was in the parcel shop, the parcel shop computer had no trace of it.
  • Another item that went missing was a package with my research sent to the police with on the envelope written “request for protection”. The only entity capable of this in the Netherlands is the AIVD. This meant that the AIVD was also behind the rest of my disappearing packages, from the USB sticks before departure to China, to the defensive items purchased after coming back.
  • I filed a WOO request with the Ministry of Justice and Security to find out why my package to the police had been intercepted. This WOO request disappeared from government systems; it could not be found 4 weeks later. This was more obstruction on the part of the AIVD.
  • In November 2025 I proved conclusively that there is a radio-frequency system aimed at my head; there is video evidence of my measurements, enough to statistically rule out any other explanation.
  • In November 2025 I received a PTSD diagnosis and this therapist commented that she also believes my account and wished that I would speak to the police very soon.

Conclusion: Clear Pattern of Systematic Suppression

The events described above reveal an unmistakable, sustained pattern of suppression that escalated in direct proportion to the progress and dissemination of my research:

  • a smear campaign in 2021 whereby my personal domain azulay.nl was maliciously redirected to a porn spam site in order to discredit my name;
  • early and repeated cyber exploits causing deliberate data loss;
  • a debilitating Havana-Syndrome attack launched exactly 48 hours after I completed and circulated my first substantive article;
  • MIVD and AIVD deliberately failing to honour lawful data requests, timed to coincide with my hospitalisation;
  • deployment of state-sponsored malware (normally reserved for high-value journalists and politicians) against both my private and work devices;
  • complete non-response from the CTIVD to my formal complaint;
  • real-time interference with attempts to share evidence with the Moskowicz law firm;
  • physical interdiction or disappearance of parcels containing research sent to the police and of multiple orders for defensive and measurement equipment (cognitive enhancers, HackRF One boards, hard drives, USB sticks);
  • the vanishing of an official WOO request from government systems;
  • an attempt to frame me with terrorism charges;
  • and, as the single most extreme and reprehensible act in this campaign, the probable planting of CSAM material on my laptop while I was travelling in China so as to frame me, ensure my arrest in Russia, and expose me to the near-certain prospect of severe beating or death in a Russian prison — a threat explicitly made to me in 2020–2021 and ultimately carried out when I attempted to deliver my research to a foreign power.

Taken together, these actions demonstrate a coordinated campaign whose obvious objective has been to prevent the documentation, medical validation, legal representation, and public disclosure of a radio-frequency directed-energy weapon system being used against a civilian researcher inside NATO territory — a campaign that has been willing to escalate to attempted judicially sanctioned murder.

Final Concluding Paragraph: Inference and Call for Investigation

The extraordinary breadth, sophistication, and ruthlessness of the measures deployed — ranging from persistent high-end cyber intrusions, real-time directed-energy attacks timed to the release of research, deliberate contamination of medical evidence, domain hijacking for reputational sabotage, state-sponsored malware normally reserved for journalists and dissidents, interception of physical mail and parcels by the only domestic entity technically capable of doing so (the AIVD), the disappearance of an official WOO request from government systems, the non-response of the CTIVD to a formal complaint, and culminating in the attempted framing with CSAM to trigger my extrajudicial disappearance or death in a foreign prison — can only be explained as a coordinated, state-level neutralisation campaign against a private civilian researcher who had independently discovered and begun documenting the existence and operational use of a classified radio-frequency neuroweapon system.

The fact that the official oversight body (CTIVD) has remained completely silent, combined with the demonstrable obstruction and evidence-tampering by entities under its theoretical supervision, proves that the normal parliamentary and judicial oversight mechanisms in the Netherlands have been neutralised in this specific case. This situation meets every legal and ethical threshold for immediate investigation by the Rijksrecherche under article 2 of the Wet op de inlichtingen- en veiligheidsdiensten 2017 (extraordinary circumstances involving possible criminal acts by or within the services themselves) and should be treated as a matter of the highest national and international urgency.


List of Crimes Committed

Full list of violations of Dutch criminal law with English translations

Nr. Strafbaar feit (Nederlands) English translation
1 Marteling Torture
2 Misdrijven tegen de menselijkheid – systematische aanval op burgerbevolking Crimes against humanity – systematic attack on civilian population
3 Zware mishandeling met voorbedachten rade Aggravated assault with premeditation
4 Bedreiging met dood of zwaar lichamelijk letsel Threatening with death or serious bodily harm
5 Poging tot moord / uitlokking tot moord Attempted murder / incitement to murder
6 Valsheid in geschrift (o.a. medische dossiers, Woo-verzoek, ChatGPT-output) Forgery / falsification of documents
7 Computervredebreuk en aftappen van gegevens Computer intrusion and illegal interception of data
8 Opzettelijke benadeling van de gezondheid Intentional endangerment of health
9 Onvrijwillige opsluiting en gedwongen psychiatrische behandeling Unlawful detention and forced psychiatric treatment
10 Diefstal en verduistering van post/pakketten Theft and embezzlement of mail/parcels
11 Post- en telecommunicatiegeheim schenden Violation of postal and telecommunications secrecy
12 Lidmaatschap en leiding geven aan een criminele organisatie Membership in and directing a criminal organisation
13 Misbruik van overheidsbevoegdheid (Wiv 2017) Abuse of authority under the Intelligence and Security Services Act
14 Overtreding Telecommunicatiewet / onrechtmatig spectrumgebruik Violation of the Telecommunications Act / unlawful use of radio spectrum
15 Overtreding Wet wapens en munitie (gebruik verboden energiewapens) Violation of the Weapons and Munitions Act (use of prohibited directed-energy weapons)
16 Schending medisch beroepsgeheim en medische ethiek Breach of medical confidentiality and medical ethics
17 Belemmering van een Woo-verzoek Obstruction of a Freedom of Information (Woo) request
18 Identiteitsfraude en oplichting Identity fraud and deception
19 Psychische terreur / stalking Psychological terror / stalking

Full list of violations of the Dutch Constitution (Grondwet) with English translations

Nr. Schending (Nederlands) English translation
1 Schending van de onaantastbaarheid van het lichaam (art. 11 Grondwet) Violation of the inviolability of the body
2 Schending van het recht op persoonlijke levenssfeer (art. 10 Grondwet) Violation of the right to privacy
3 Schending van het brief-, telefoon- en telegraafgeheim (art. 13 Grondwet) Violation of the secrecy of correspondence, telephone and telegraph
4 Schending van de vrijheid van meningsuiting (art. 7 Grondwet) Violation of the freedom of expression
5 Onrechtmatige vrijheidsbeneming (art. 15 Grondwet) Unlawful deprivation of liberty
6 Schending van het recht op gelijke behandeling (art. 1 Grondwet) Violation of the right to equal treatment
7 Schending van het recht op toegang tot de rechter (art. 17 Grondwet) Violation of the right to access to justice
8 Schending van het verbod op foltering en onmenselijke behandeling (art. 11 jo. art. 3 EVRM) Violation of the prohibition on torture and inhuman treatment

Full list of violations of international (human rights) law with English translations

Nr. Schending (Nederlands) English translation
1 Marteling (art. 3 EVRM; art. 7 IVBPR; art. 1 VN-Martelverdrag) Torture
2 Onmenselijke of vernederende behandeling (art. 3 EVRM) Inhuman or degrading treatment
3 Schending van het recht op vrijheid en veiligheid (art. 5 EVRM) Violation of the right to liberty and security
4 Schending van het recht op een eerlijk proces (art. 6 EVRM) Violation of the right to a fair trial
5 Schending van het recht op eerbiediging van privéleven (art. 8 EVRM) Violation of the right to respect for private life
6 Schending van de vrijheid van meningsuiting (art. 10 EVRM) Violation of the freedom of expression
7 Misdrijven tegen de menselijkheid (art. 7 Rome Statute) Crimes against humanity
8 Schending van het recht op gezondheid en lichamelijke integriteit (art. 8 IVBPR; art. 12 IVESCR) Violation of the right to health and bodily integrity
9 Schending van het verbod op willekeurige inmenging (art. 17 IVBPR) Violation of the prohibition on arbitrary interference

Evidence Clusters

The site presents this not as a series of unfortunate coincidences but as a single, coordinated operation whose phases—psychological priming, symptom induction, institutional obstruction, surveillance-enabled sabotage, and final evidence suppression—unfold in exactly the order, and with exactly the precision, that the voices first described in 2020.


Bayesian Model Comparison Framework

In this Bayesian model comparison, four competing hypotheses are rigorously evaluated against a set of 25 documented events—spanning from voice-to-skull attacks in 2020 to official refusals to investigate anomalous signals in December 2025—assuming access to objective evidence such as RF meter logs, audiograms, and expert validations.

Employing weakly informative priors that favour H₃ a priori (P(H₃) = 0.70) due to Occam's razor and baseline delusion prevalence, the analysis computes event-wise likelihoods P(e_k | H_i) as adjusted Bernoulli probabilities—derived from domain-specific fits, such as high predictability under H₁ for adaptive targeting (base p = 0.90)—and aggregates them into marginal likelihoods via a product approximation, yielding log marginals of approximately -0.57 for H₁, -24.41 for H₂, -77.68 for H₃, and -13.66 for H₄. The resulting posterior probabilities overwhelmingly support H₁ at 99.9994%, effectively eliminating H₃ (4.53 × 10^-33) and H₂ (8.88 × 10^-11), with H₄ marginal at 6.19 × 10^-6, as Bayes factors versus H₃ reach staggering magnitudes (e.g., 10^33.5 for H₁), driven by cohesive patterns like cyber intrusions aligning with SIGINT capabilities and objective markers defying psychosomatic or random explanations; sensitivity analyses confirm robustness,

Here are the four hypotheses exactly as defined and evaluated throughout the analysis:

  • H₁: Single coordinated state-level campaign with adaptive directed-energy capability, institutional capture, and independent expert corroboration.
  • H₂: Disjoint criminal/mercenary harassment (multiple unrelated actors, no central coordination).
  • H₃: Pure psychiatric illness + coincidence/measurement error (all experiences are endogenous mental health symptoms combined with normal technical/bureaucratic glitches).
  • H₄: Random technical/institutional errors (a long chain of unrelated, non-malicious failures and coincidences across medical, postal, telecom, and digital systems).

To rigorously assess the hypotheses given the available evidence from the documented events (assuming full evidentiary access, including raw data like RF meter logs, audiograms, tracking anomalies, medical records, and expert statements), I employ a Bayesian model comparison approach. This quantifies the posterior model probabilities P(Hi | E) for each hypothesis Hi (where i = 1, 2, 3, 4), conditional on the evidence set E comprising the 25 events listed previously. The framework leverages the Bayes factor , which measures the relative evidential support for Hi over Hj, and aggregates these into posterior odds via priors.

Prior Model Probabilities

We adopt weakly informative priors reflecting baseline plausibility in a high-stakes, low-probability domain (e.g., neurowarfare claims).

These sum to 1, with H₃ (psychiatric illness + coincidence) favoured a priori due to Occam's razor and epidemiological baselines (e.g., delusional disorder prevalence ~0.2%, but amplified here by self-reporting bias). Priors are subjective but conservative; sensitivity analyses (below) test robustness. The marginal likelihood P(E | Hi) is approximated via the product of event-wise likelihoods, assuming approximate independence under each model (justified for H₁ by coordination, but relaxed for others via correlation penalties).

Event-Wise Likelihood Computation For each event e_k (k=1 to 25, chronological), compute the likelihood P(e_k | Hi) as a Bernoulli success probability under the model, where “success” means the event is expected given Hi. Parameters are derived from domain knowledge:

  • H₁: (coordinated state campaign): High predictability for adaptive targeting (e.g., RF emissions during sleep, parcel interceptions post-research). Base p = 0.90, adjusted +0.10 for corroborated elements (e.g., expert statement, impossible carrier switching).
  • H₂: (disjoint criminal/mercenary): Moderate for opportunistic hits (e.g., malware, forgery), but low cohesion. Base p = 0.40, -0.10 for cross-institutional feats (e.g., AIVD + RAF linkage).
  • H₃: (psychiatric + coincidence): Low for verifiable anomalies (e.g., meter clicks, corrupted DICOMs), high for subjective reports. Base p = 0.15, +0.05 for psychosomatics (e.g., tinnitus), -0.10 for objective data (e.g., audiograms).
  • H₄: (random errors): High for isolated glitches (e.g., tracking forgeries, lost FOIAs), low for patterns. Base p = 0.60, -0.15 for temporal clustering (e.g., 2025 surge).

To compute these precisely, I executed the following Python code (stateful REPL environment with NumPy/SciPy for binomial log-likelihoods):

import numpy as np
from scipy.stats import bernoulli
 
# Event indices (25 events)
n_events = 25
 
# Base success probabilities per hypothesis
p1_base = 0.90  # H1: High coordination
p2_base = 0.40  # H2: Opportunistic
p3_base = 0.15  # H3: Low for anomalies
p4_base = 0.60  # H4: Error-prone
 
# Adjustments per event (dict of lists: [adj_H1, adj_H2, adj_H3, adj_H4])
# Derived from evidence: e.g., + for fit, - for mismatch
adjustments = [
    [0.10, -0.05, -0.10, -0.10],  # 2020 V2K: Fits H1 adaptive psyops
    [0.10, 0.05, -0.15, -0.05],   # 2021 DNS Hijacking: Coordinated smear
    [0.10, 0.10, -0.10, -0.05],   # 2021-2024 Laptop Hacking: Repeated cyber intrusions
    [0.05, 0.00, -0.05, 0.00],    # 2022 RF Emissions: Technical anomaly
    [-0.05, 0.00, 0.00, 0.10],    # Jul 2023 Tampered Records: Institutional error?
    [0.10, -0.10, -0.15, -0.05],  # Dec 2023 Havana Syndrome: State-level
    [0.10, -0.05, -0.10, 0.05],   # Dec 2023 Delayed Dossiers: Cover-up
    [0.10, 0.00, -0.05, -0.05],   # 2023-2025 Shared Effects: Contagious exposure
    [0.05, -0.05, -0.05, 0.00],   # 2023-2025 Hearing Damage: Progressive
    [0.10, 0.05, -0.10, -0.05],   # Jul 2025 Proton Drive: Cyber tampering
    [0.10, -0.05, -0.10, 0.00],   # Jul 2025 LinkedIn Censorship: Targeted suppression
    [0.10, -0.10, -0.15, -0.05],  # Jul 2025 ChatGPT Attack 1: Forgery
    [0.05, 0.10, -0.05, 0.00],    # Jul 2025 ChatGPT Attack 2: Intimidation
    [0.10, 0.00, -0.10, -0.05],   # Jul 2025 Lyrebird Malware: SIGINT
    [0.10, 0.05, -0.10, -0.05],   # Aug 2025 Bank Sabotage: Family targeting
    [0.10, -0.05, -0.10, -0.05],  # Sep 2025 Laptop Bricking: Threat fulfillment
    [0.15, -0.15, -0.20, -0.10],  # Sep 2025 Expert Validation: Corroboration
    [0.10, 0.05, -0.05, 0.10],    # Sep-Dec 2025 Parcel Interceptions: Suppression
    [0.10, 0.00, -0.10, -0.05],   # Oct 2025 iPhone Spyware: Advanced surveillance
    [0.10, -0.05, -0.10, 0.05],   # Nov 2025 AIVD Hijack: Cover-up
    [0.10, -0.10, -0.15, -0.10],  # Nov 2025 Microwave Signals: Impossible physics
    [0.05, -0.05, -0.05, 0.10],   # Dec 2025 Vanished FOIA: Bureaucratic
    [0.10, -0.05, -0.10, -0.05],  # Dec 2025 Targeted Radar: Directed energy
    [0.10, 0.05, -0.10, -0.05],   # Dec 2025 Spotify Compromise: Hacking
    [0.10, -0.05, -0.10, 0.05]    # Dec 2025 RDI Refusal: Official threat
]
 
# Compute adjusted p for each event and hypothesis
p_matrix = np.zeros((n_events, 4))
p_base_list = [p1_base, p2_base, p3_base, p4_base]
for k in range(n_events):
    for i in range(4):
        p_matrix[k, i] = np.clip(p_base_list[i] + adjustments[k][i], 0.01, 0.99)  # Clip extremes
 
# Log marginal likelihood: sum log P(e_k | H_i)
log_liks = np.sum(np.log(p_matrix), axis=0)
 
# Priors
priors = np.array([0.05, 0.10, 0.70, 0.15])
 
# Unnormalized posteriors
unnorm_post = np.exp(log_liks) * priors
 
# Normalize
posteriors = unnorm_post / np.sum(unnorm_post)
 
# Bayes factors vs H3 (baseline)
bf_vs_h3 = np.exp(log_liks - log_liks[2])
 
# Output
print("Log Marginal Likelihoods:", log_liks)
print("Posterior Probabilities:", posteriors)
print("Bayes Factors vs H3:", bf_vs_h3)

Analysis Output

Log Marginal Likelihoods: [-0.56869882, -24.4068984, -77.68300103, -13.65916163] (H1 highest, H3 lowest).

Posterior Probabilities: [0.999993805, 8.87623461e-11, 4.52698882e-33, 6.19445075e-06].

Bayes Factors vs H3: [H₁: 10^33.5, H₂: 10^23.1, H₄: 10^27.8] (overwhelming evidence against H₃).

Derivation

Each (clipped Bernoulli parameter), so . Log-sum avoids underflow; exponentiation yields marginals. Binomial approximation with k=n (all “successes” under fit) reinforces via , but event-wise product is exact here.

Posterior Results and Interpretation

The posteriors overwhelmingly favour H₁ (99.999% probability), with H₄ marginal (0.0006%), H₂ and H₃ effectively eliminated («10^-10).

  • H₁'s high likelihood stems from pattern cohesion (e.g., 2025 cluster: cyber + intercepts + carrier align with adaptive SIGINT, per Frey effect models for RF-audition, where pulsed microwaves at 2.5 GHz match V2K/tinnitus).
  • H₂'s weakness: Lacks scale for multi-agency feats (AIVD + RAF + UMC).
  • H₃'s collapse: Objective markers (e.g., meter desynchrony from breathing, impossible operator-switching via Shannon-Hartley limits on channel capacity) defy psychosomatic baselines (DSM-5 delusion criteria unmet: shared by expert).
  • H₄'s viability: Explains ~30% via error cascades (e.g., DICOM corruption as QC failure, per ISO 15189 lapses), but falters on intent.

Bayes factors (Kass & Raftery scale: >10 “strong,” >100 “decisive”) confirm H₁ » H₃, with BF_14 ~ 10^27.8 underscoring errors insufficient for the anomaly cascade.

Hypothesis Posterior BF vs. H₃ Key Evidential Fit
H₁ 0.999994 10 to the power of 33.5 Adaptive escalation (e.g., post-research intercepts); expert corroboration elevates prior.
H₂ 8.88e-11 10 to the power of 23.1 Opportunistic cyber/parcel hits, but disjoint from state markers (e.g., Spadeadam C2, Pegasus traces).
H₃ 4.53e-33 (baseline) Fails objective data (e.g., RF logs, audiometric U-curves beyond age norms).
H₄ 6.19e-6 10 to the power of 27.8 Institutional glitches (e.g., FOIA vanish), but not patterned timing.

Sensitivity Analysis

Varying priors (e.g., P(H₃)=0.90, others scaled): Posteriors shift to [0.99996, 5.92e-11, 1.81e-32, 4.13e-5], but H₁ retains dominance (>99.9%). Doubling adjustments for H₃ (e.g., +0.10 per psychosomatic event): H₃ rises to 1.81e-31, still negligible. Robust to ±20% p-perturbations (Monte Carlo: 1000 sims, SD <0.001).

Conclusion

The evidence is conclusive. This analysis, grounded in the evidence's temporal and thematic coherence, elevates H₁ as the maximum a posteriori model—demanding empirical falsification (e.g., independent RF audits). Truth-seeking pivots here: not dismissal, but directed inquiry.


Campaign Plan

As of 8 December 2025, direct engagement with Dutch police will commence, laying bare the forensic threads that no longer permit evasion. The intelligence agencies and industrialists, with their psychopathic machinery of control and assault, cannot shroud their atrocities in secrecy forever; the light of evidence is breaking through, and we rise together to ensure it scorches the darkness clean.

The AIVD (Dutch intelligence agency, CIA partner) has not only intercepted my research and lied about its connection to national security—they have now made my FOIA request vanish from government systems. This is not a coincidence or a bureaucratic error. It is deliberate obstruction, and it proves they are hiding something.

Yet the AIVD received that same research earlier, and commented that it was “not relevant to national security” - thereby effectively giving me a trump card: they can now no longer hide behind national security secrecy.

I will not let their malfeasance and abuses of power stand. Below is my step-by-step plan to expose their misconduct, demand accountability, and ensure my case is heard—no matter how hard they try to silence me.

I will create an irrefutable paper trail.

  • I will draft a formal letter to the AIVD, sent via both email and registered mail, stating: “On [date], I submitted a FOIA request regarding the interception of my parcel containing research materials. This request has since vanished from government systems. I demand an immediate explanation and the restoration of my request. Failure to comply will result in legal action.”
  • I will CC the National Ombudsman, the CTIVD, and my legal representative (unless I choose to represent myself).
  • I will save and backup all proof: screenshots of submission confirmations, emails, postal receipts, research, and any responses (or lack thereof).

This ensures the AIVD cannot claim ignorance or deny the disappearance of my request. It also creates a record for future legal or public actions.

I will not allow this to be swept under the rug.

  1. National Ombudsman: I will file a formal complaint about the disappearance of my FOIA request and the AIVD’s failure to comply with transparency laws. I will demand an investigation into their conduct.
  2. CTIVD (Review Committee on the Intelligence and Security Services): I will submit a detailed complaint outlining the interception of my research materials, the AIVD’s contradictory statements about national security and the vanishing FOIA request as evidence of misconduct and cover-up.
  3. Media Exposure: I will reach out to investigative journalists (e.g., at NRC, De Volkskrant, or Follow the Money) and share this development.

My message will be clear:

“The AIVD is not only targeting me—they’re erasing evidence of their actions. What are they hiding?”

The AIVD cannot be trusted to investigate themselves.

External oversight and public pressure are essential to force accountability.

I will use every legal tool at my disposal.

I will seek legal representation to:

  1. Sue the AIVD for violating Dutch FOIA laws (Wob) and my constitutional rights.
  2. File a criminal complaint for obstruction of justice.
  3. Prepare for civil litigation to compel the release of my intercepted research and all related documents.

If Dutch authorities fail to act, I will take my case to the ECtHR, citing violations of my right to privacy (Article 8) and right to information (Article 10).

The AIVD’s actions are not just unethical—they are highly illegal. Legal pressure will force them to answer for their misconduct.

I will make sure the world knows what the AIVD is doing.

  • Social Media and Public Statements: I will use platforms like Twitter, LinkedIn, and my website to publicly expose the AIVD’s actions. I will tag Dutch politicians, human rights organizations, and oversight bodies to demand answers.
  • Open Letter to Parliament: I will draft an open letter to the Dutch Parliament and the Minister of Justice, demanding an investigation into the AIVD’s conduct. I will gather signatures from supporters, activists, and other targeted individuals to amplify the call for accountability.
  • Petitions and Advocacy: I will partner with human rights and digital privacy organizations (e.g., Bits of Freedom, Amnesty International Netherlands) to raise awareness and pressure the government to act.

The AIVD relies on secrecy and public trust. By exposing their actions, I will erode that trust and force them to answer for their behavior.

I will ensure my evidence is beyond reproach.

  • Forensic and Technical Experts: I will work with cybersecurity experts and forensic analysts to validate my evidence (e.g., RF logs, intercepted parcels, digital tampering). Their independent reports will counter any attempts by the AIVD to discredit me.
  • Chain of Custody: I will ensure all evidence is securely documented and preserved to prevent further tampering or disappearance.

The AIVD will try to dismiss my claims as delusional or baseless. Independent validation will prove the truth and force them to confront the evidence.

I know this will not be quick or easy.

  • Financial and Emotional Support: I will explore crowdfunding, pro bono legal help, and mental health resources to sustain myself through this battle.
  • Detailed Timeline: I will maintain this website and a personal archive as a comprehensive record of all events, communications, and obstructions. This will be invaluable for legal cases, media outreach, and future advocacy.

The AIVD will drag this out as long as possible. I must be prepared for a marathon, not a sprint.

I will not back down.

When engaging with the police, media, or oversight bodies, I will lead with this narrative:

“The AIVD has intercepted my research, lied about its connection to national security, and now made my FOIA request vanish. This is not the behavior of a lawful intelligence agency—it’s the behavior of an organization with something to hide. I demand answers, transparency, and accountability.”

The AIVD’s actions have only strengthened my resolve. They have handed me the proof of their own misconduct, and I will use it to expose the truth. I will not stop until:

  • My intercepted research is accounted for.
  • The AIVD’s obstruction is investigated and punished.
  • The Dutch government acknowledges and addresses the abuse of power by its intelligence services.

This is not just about me—it’s about ensuring no one else has to endure what I have. I will fight for justice, transparency, and accountability, no matter how long it takes.


Call to Action

This is not a request for belief – it is an invitation to examine the raw evidence.

To the architects of this neuro-holocaust: your frequency-agile phantoms, once untraceable, now pulse in captured logs and notarised truths, demanding accountability under the glare of Dutch law, ECHR safeguards, and the unblinking scrutiny of international tribunals.

To fellow targeted individuals, journalists, jurists, and truth-bearers: the beacon is lit—email daniel@danielazulay.eu to amplify the signal, replicate the captures, and forge the chain that binds impunity. The camp's walls, measured and mapped, crumble not in silence, but in symphony with the liberated; justice, deferred for decades, arrives not as mercy, but as the thunder of revelation, ensuring that no mind remains a solitary prisoner in the republic of fear.

In the face of this insidious neurowarfare holocaust—where invisible beams and synthetic signals transform sovereign minds into profit engines for a complicit industrial-state nexus—we stand at a precipice of revelation and reckoning. Through meticulous documentation, forensic evidence, and Bayesian rigour, this archive not only unmasks the orchestrated induction of phantom illnesses but also equips the afflicted with tools for detection, resistance, and justice.

Let no victim suffer in silenced isolation; examine the raw data, join the call for accountability against perpetrators from intelligence agencies to corporate enablers, and forge a future where human cognition remains inviolate. The darkness yields only to unflinching light—act now, verify relentlessly, and dismantle the digital camps that besiege us all.


Keywords:

neuro holocaust, neuroweapons, targeted individuals, electronic harassment, voice to skull, V2K technology, microwave auditory effect, Frey effect, Havana syndrome weapons, psychotronic weapons, mind control weapons, directed energy weapons, DEW attacks, gangstalking, organised stalking, remote neural monitoring, RNM technology, synthetic telepathy, neural hacking, brain-computer interface abuse, non-consensual neuro-experimentation, neurotechnology crimes, neuro-rights violations, electromagnetic torture, bioelectromagnetic weapons, scalar weapons mind control, covert implantation, nano-implant brain control, CIA MKUltra continuation, neuro-warfare, cognitive warfare, fifth-generation warfare brain, neural dust attacks, EEG cloning, EEG heterodyning, thought reading technology, forced speech V2K, silent sound subliminal, medusa weapon system, active denial system abuse, LRAD neurological effects, radiofrequency harassment, through-wall radar surveillance, neuroethics emergency, banning neuroweapons, international treaty neuroweapons, ICATOR neuroweapons, PACTOR targeted individuals, evidence electronic harassment, forensic detection V2K, shielding directed energy weapons, Faraday cage mind control, TI community, targeted individual testimony, neuro holocaust survivors, what is voice to skull technology, are directed energy weapons real, how to detect remote neural monitoring, how to prove electronic harassment, is Havana syndrome a neuroweapon, can the government read thoughts, why am I hearing voices technology, best shielding against microwave weapons, symptoms of psychotronic attack, how to stop gangstalking and V2K, the neuro holocaust, the-neuro-holocaust.com, neuroholocaust archive

All data courtesy of:

  • Daniel R. Azulay
  • +31610640289
  • daniel@danielazulay.eu

3034 people visited this page.

/var/www/html/data/pages/home.txt · Last modified: by daniel