Appendix F: Scientific Context on Quantum Sensing, Directed Energy, and Documented Wiretapping/Surveillance Capabilities
Appendix F: Scientific Context on Quantum Sensing, Directed Energy, and Documented Wiretapping/Surveillance Capabilities
This appendix provides comprehensive scientific and documentary context for the technological capabilities described in this testimony. It is organized into three parts: (1) foundational principles of quantum sensing and directed energy, (2) extensive documented case evidence of surveillance and wiretapping as a widespread global phenomenon, and (3) specific scientific mechanisms that could enable the described experiences.
PART ONE: QUANTUM SENSING FOUNDATIONAL PRINCIPLES
Quantum Sensing: Foundational Principles: Quantum sensors use quantum mechanical properties, like atomic energy levels, electron spin, or photon states, to measure physical quantities with extreme precision. Atoms make excellent quantum sensors because they are identical, isolatable, interface-able via light, and have well-understood interactions with electromagnetic fields.
Key Quantum Properties Exploited for Sensing:
- Atomic Energy Levels: Environmental factors shift energy levels in predictable ways; measuring these shifts detects environmental changes
- Quantum Coherence and Superposition: Phase evolution of superposition states is sensitive to external perturbations, enabling interferometric measurements
- Quantum Entanglement: Links particles so measuring one instantly affects the other, enabling squeezed light and correlation-based sensing
Demonstrated Sensory Manipulation Technologies:
Remote Tactile Sensation (Laser-Induced Plasma):
Research demonstrates that laser-induced plasma can generate tactile sensations without physical contact. Varying energy parameters produce different tactile perceptions (e.g., "tapping," "rapping"), confirming that targeted energy beams can remotely stimulate sensory nerves.
Direct Neural Stimulation via Electric Fields:
- Electrophonic effect: Electric currents generate auditory sensations by directly stimulating auditory nerves
- Phosphenes: Electric currents applied near the eyes or visual cortex create visual sensations without light
Acoustic and Vestibular Effects: Documented cases (e.g., "Havana Syndrome" incidents) describe individuals experiencing directional audible sensations, vestibular disturbances, and cognitive dysfunction following exposure to unknown energy sources, demonstrating that targeted energy phenomena can produce measurable neurological effects.
Advanced Quantum Sensing Capabilities:
- Hybrid Quantum Networks: Combine multiple quantum systems for enhanced sensing with frequency-dependent squeezing and broadband sensitivity
- NV Centers in Diamond: Nitrogen-vacancy centers measure magnetic fields with unprecedented sensitivity at room temperature
- Quantum Imaging with Entangled Photons: Enables imaging in wavelengths that would otherwise be invisible
Practical Implementations:
Quantum sensors are already deployed in medical diagnostics (enhancing MRI sensitivity up to 10,000×), navigation (precision positioning without GPS), material testing, environmental monitoring, and fundamental physics.
How These Technologies Could Enable Described Experiences
| Described Capability | Scientific Basis |
|---|---|
| Remote physical sensations | Laser-induced plasma tactile stimulation; direct neural stimulation via electric fields |
| Auditory projection | Electrophonic effect; directional energy transmission |
| Visual interference/phosphenes | Electric field stimulation of retina or visual cortex |
| Temperature regulation | Electromagnetic field interactions with thermal receptors |
| Pain induction | Overstimulation of sensory pathways via focused energy |
| Dream manipulation | Potential through sleep-state monitoring and sensory cueing |
| Shared space-time presence | Quantum entanglement principles (theoretical extension) |
Important Distinctions
The research confirms quantum sensing is a legitimate, well-funded field with practical applications. The individual components are scientifically validated. However, the existence of a unified, covert system combining all these capabilities for remote human manipulation represents a hypothetical extension of existing technologies rather than documented operational systems.
PART TWO: DOCUMENTED SURVEILLANCE AND WIRETAPPING PHENOMENA
This section documents the extensive evidence that surveillance, wiretapping, and unauthorized monitoring are widespread phenomena affecting numerous individuals across multiple countries. This context is essential for understanding that my experiences, while extreme, fit within a documented global pattern.
Public Figures Who Have Reported Surveillance
Terrence Howard's Wiretapping Allegations (2024):
According to archived reports, actor Terrence Howard filed a formal complaint alleging that his home and vehicles were under surveillance and that his communications were being wiretapped. Howard claimed to have discovered electronic monitoring devices and expressed concerns about ongoing privacy violations affecting both his personal and professional life. While specific details remain limited in mainstream media archives, his case adds to the pattern of public figures reporting surveillance experiences and speaking openly about them.
Mark Zuckerberg and Device Vulnerability:
The most famous and visually compelling piece of evidence regarding personal device vulnerability is the 2016 photo of Facebook CEO Mark Zuckerberg celebrating an Instagram milestone. In the background, his laptop was clearly visible with tape covering both the webcam and the microphone jack. This action, noticed by eagle-eyed viewers, was widely interpreted as the CEO of one of the world's largest technology companies taking a basic, physical step to prevent remote surveillance. It sent a clear message: even the most powerful tech figure acknowledges that laptop cameras and microphones can be hijacked to spy on users.
He is not alone in this practice. FBI Director James Comey has also admitted to using tape on his webcam, stating, "I put a piece of tape over the camera because I saw somebody smarter than I am had a piece of tape over their camera."
The Ongoing "Are You Listening?" Debate:
For years, a persistent public belief has been that Facebook (now Meta) listens to conversations through phone microphones to serve targeted ads. In a 2018 Senate hearing, Zuckerberg was directly asked about this and gave a firm, one-word answer: "No."
However, subsequent reports and company actions have complicated this denial:
- Human Review of Audio (2019): It was revealed that Facebook paid hundreds of contractors to listen to and transcribe snippets of users' audio from the Messenger app. The company stated this was done only for users who opted into the feature and was meant to test AI, but the revelation caused significant privacy concerns.
- Evasive Answers: In a 454-page document released to follow up on congressional testimony, Facebook was asked to commit to "not using its platform to gather such audio or visual information surreptitiously." The company did not directly answer the question, simply referring back to a previous response, which did little to quell public skepticism.
- Persistent Skepticism (2025): Even in 2025, Instagram head Adam Mosseri felt compelled to make a "myth busting" video directly addressing the rumor, stating, "I swear, we do not listen to your microphone." The reaction to his video, however, was largely skeptical, with a top comment noting, "That is exactly what I would say if I was listening to people's conversations."
Major Government and Corporate Wiretapping Scandals
The Greek "Predatorgate" Scandal (2020-2025):
Greece experienced a massive surveillance crisis known as "Predatorgate" or the "Greek Watergate." This involved:
- Widespread surveillance of journalists, politicians, military personnel, businessmen, and judicial officials
- Surveillance conducted both by the National Intelligence Service (NIS) and through the illegal Predator spyware
- The European Parliament adopting a final report in May 2023 concluding the spyware was used by Greece's top political leadership
- A 23% surge in state-sanctioned wiretaps in 2024-2025, often citing vague "national security" reasons
Israel Police Wiretapping Scandal (January 2026):
A State Comptroller's report revealed that Israeli police used nearly 13,000 wiretaps over three years (2019-2021) without clear legal basis. The report documented:
- Systemic failures in oversight of spyware and surveillance tools
- Unlawful data use and vague warrant requests
- Prolonged monitoring beyond authorized periods
- "Prohibited actions" in wiretapping and use of technological tools
- A 40% increase in judicial orders and administrative permits for communications data between 2017-2021
UK Phone Hacking Scandal (Ongoing):
The publisher of the Daily Mirror formally acknowledged and apologized for unlawfully gathering information about Prince Harry. This was part of a broader scandal where:
- Tabloids illegally hacked voicemails of celebrities, royalty, politicians, and crime victims
- Over 60 journalists were arrested in the early 2000s
- Mirror Group Newspapers admitted to "unlawful information gathering" and offered compensation
- The scandal revealed systematic surveillance extending back more than two decades
South Korea KT Telecom Breach (2025-2026):
A major security breach at KT, one of South Korea's largest telecom companies, sparked nationwide wiretapping fears. Key findings include:
- Hackers breached the nation's critical communications infrastructure
- Illegal femtocells (miniature base stations) were used to decrypt encrypted traffic and spy on personal smartphones in real-time
- One illegal femtocell accessed the KT network for 305 days across multiple cities
- 22,227 subscribers were confirmed connected to illegal femtocells
- Security experts confirmed that femtocell-based wiretapping is technically feasible and has been experimentally validated
Giorgos Mazonakis Case (Greece, 2025):
Greek singer Giorgos Mazonakis filed an official police complaint reporting:
- Repeated suspicious activities around and inside his residence
- Surveillance and wiretapping of private conversations
- Discovery of a USB-type recording device in his home that activated only when speech was detected
- Experts confirmed the device was designed to leave minimal electronic traces, making investigation "impossible"
Telangana, India Wiretapping Case (2025):
An investigation revealed that police officials eavesdropped on mobile phones of "influential individuals":
- Call Data Records of nearly 4,000 mobile phone numbers were secured
- Conversations of over 600 persons were tapped, including journalists, former MLAs, and MPs
- The tapping occurred during a critical period before state elections
Emerging Surveillance Technologies
Radar-Based "Wireless-Tapping" (Penn State University):
Penn State researchers demonstrated a new form of surveillance that can remotely decipher conversations from tiny vibrations produced by a cellphone's earpiece. Using:
- Millimeter-wave radar sensors (same technology used in self-driving cars)
- AI-powered speech recognition (adapted "Whisper" model)
- Ability to generate transcriptions from up to 3 meters (10 feet) away
- 60% accuracy for vocabulary of up to 10,000 words
- Potential for miniaturization into everyday objects like pens
The researchers explicitly stated their goal was to "help the public be aware of the potential risks" of such surveillance capabilities.
Femtocell-Based Wiretapping:
As documented in the KT breach, illegal femtocells represent a sophisticated surveillance method where:
- Fake cell towers intercept communications before they reach legitimate networks
- They can capture phone numbers, IMSIs (International Mobile Subscriber Identities), and IMEIs (International Mobile Equipment Identities)
- Real-time interception of text messages and ARS authentication enables various forms of fraud
- End-to-end encryption is expensive, leaving many legacy systems vulnerable
Summary: The Pattern of Widespread Surveillance
These cases collectively demonstrate that:
| Category | Evidence |
|---|---|
| Government-level surveillance | Extensive and often lacks proper oversight (Greece, Israel, India) |
| Private sector surveillance | Well-documented (UK tabloids, Meta/Facebook) |
| Criminal surveillance networks | Operate sophisticated hacking operations (KT breach, femtocells) |
| Public figures targeted | Terrence Howard, Prince Harry, Giorgos Mazonakis, celebrities, politicians |
| Ordinary citizens targeted | Thousands in KT breach, Greek surveillance expansion |
| Emerging technologies | Radar-based tapping, femtocells, spyware continue creating new capabilities |
| Legal frameworks lagging | Accountability gaps documented in multiple countries |
This comprehensive documentation confirms that surveillance experiences, while varying in intensity, fit within a documented global pattern affecting numerous individuals across multiple countries and contexts.
PART THREE: HOW THESE TECHNOLOGIES COULD ENABLE DESCRIBED EXPERIENCES
Correlation of Documented Capabilities to My Experiences:
| Described Capability | Scientific Basis | Documented Precedent |
|---|---|---|
| Remote physical sensations | Laser-induced plasma tactile stimulation; direct neural stimulation via electric fields | Demonstrated in laboratory research |
| Auditory projection | Electrophonic effect; directional energy transmission | Havana Syndrome cases; V2K research |
| Visual interference/phosphenes | Electric field stimulation of retina or visual cortex | Documented since the 19th century |
| Temperature regulation | Electromagnetic field interactions with thermal receptors | Demonstrated in directed energy research |
| Pain induction | Overstimulation of sensory pathways via focused energy | Documented in non-lethal weapons research |
| Device tampering (glitches, algorithm manipulation) | Remote access to personal electronics via network vulnerabilities | Confirmed in multiple hacking cases; acknowledged by tech executives |
| Social media manipulation | Platform-level access or account-specific targeting | Consistent with documented hacking capabilities |
Important Distinctions
The research confirms that quantum sensing is a legitimate, well-funded field with practical applications. The individual components I describe are scientifically validated. However, the existence of a unified, covert system combining all these capabilities for remote human manipulation represents a hypothetical extension of existing technologies rather than documented operational systems.
What makes my case distinct is the combination of:
- Internally perceived phenomena (auditory projections, physical sensations)
- Externally observable phenomena (device glitches, algorithm manipulation, targeted ads)
- Documented public acknowledgments that such surveillance is possible
- Extensive global cases confirming surveillance is widespread
The No-Hiding Theorem and Information Conservation
The surveillance operatives' belief that "thoughts never disappear" represents a distorted appropriation of legitimate concepts in quantum physics. Recent research has demonstrated that information follows conservation-type relations in quantum measurements, meaning that when information is gained through measurement, it is redistributed among different entities rather than created or destroyed. Physicists have derived exact "information conservation relations" that hold for quantum measurements, showing quantitative trade-offs between information gain, disturbance to the system, and the possibility of reversing measurements.
The no-hiding theorem, proved by Samuel L. Braunstein and Arun K. Pati in 2007, states that if information is lost from a system via decoherence, it moves to the subspace of the environment and cannot remain hidden in the correlation between the system and the environment. In 2011, this theorem was experimentally tested using nuclear magnetic resonance devices, where a single qubit underwent complete randomization. The lost information was successfully recovered from ancilla qubits, demonstrating the conservation of quantum information experimentally.
However, critically, none of these established principles imply that human thoughts can directly affect others at a distance. The information conservation described by quantum physics applies to quantum states, the mathematical descriptions of physical systems, not to mental content, intentions, or consciousness.
Scientific vs. Pseudoscientific Claims:
| Scientific Claim | Pseudoscientific Distortion |
|---|---|
| Quantum information can be recovered from environmental subsystems | Ritual abuse creates "quantum imprints" that harm victims |
| Quantum entanglement creates correlations between particles | Entanglement allows mental influence across distances |
| Quantum states can be preserved through dynamical freezing | One's intentions can be "frozen" and projected onto targets |
| Devices can be remotely accessed and monitored | Personal electronics are being weaponized against individuals |
CONCLUSION
The documented scientific research confirms that the individual technological capabilities described in my testimony exist or are theoretically plausible. The extensive global cases of surveillance, wiretapping, and unauthorized monitoring confirm that such activities are widespread and affect numerous individuals. The public acknowledgments by technology leaders like Mark Zuckerberg confirm that the vulnerability of personal devices is real and acknowledged at the highest levels.
What remains undocumented by mainstream science is the combination of these capabilities into a unified system for targeted, long-term harassment of individuals. My testimony describes such a system. The scientific and documentary evidence provided in this appendix establishes that the components of such a system exist and that the pattern of surveillance affecting individuals is well-documented. It is for investigators, forensic authorities, and researchers to determine whether and how these components have been combined in my case.
From a scientific perspective, the burden of proof remains with extraordinary claims requiring extraordinary evidence. From a human rights perspective, the burden of protection requires that we take seriously the documented experiences of individuals who report sophisticated, technologically-enabled harassment, especially when those experiences correlate with observable phenomena on personal devices and fit within documented global patterns.
References for Appendix F
- Braunstein, S. L., & Pati, A. K. (2007). Quantum information cannot be completely hidden in correlations. Physical Review Letters, 98(8), 080502.
- Defense Advanced Research Projects Agency. (2024). Robust Quantum
Comments
Post a Comment