-
22nd October 2025 04:08
Link to Post #1
Interview With TI Innovator Amy Holem
Signals, Shields, and Innovation for Survival: An Interview with Amy Holem Regarding her War on the Invisible Weapons
From military police to digital forensics pioneer — how one woman turned targeting into technology
Conducted by Kevin Boykin
October 2025
Section I – Early Military Experience & Harassment
KB: Amy, let’s start with how this all began. When did you first start noticing harassment or surveillance behaviors?
AH: It really began while I was still enlisted. If I went out somewhere alone — say a movie theater — my sergeant would show up in the same theater, sitting just a few rows away. If I went into a motorcycle shop, he’d walk in fifteen or twenty minutes later. It was constant tracking and tracing — complete harassment from someone in my own unit.
KB: That’s terrible. And this was while you were serving as Military Police?
AH: Yes, I was an MP. They’d make me sit on sergeants’ laps, force me to wear makeup even though it wasn’t required, and then make sexual comments all day. It was demeaning. The early 2000s — around 2001 to 2003 — was when the Army was just beginning to open combative MOS positions to women. At that time, the only true combat option for us was Military Police. We weren’t allowed into infantry or armor, only admin, medical, or supply.
I wanted to serve in a combat capacity, so I chose MP. My PT scores were top of the class — I ranked seventh out of roughly 300 recruits, male and female combined. That didn’t matter. Inside the system it was always a male’s word against a female’s, and complaints went nowhere unless you were willing to risk your entire career.
KB: Did you realize then that what was happening was part of something larger — what we’d now call “targeting”?
AH: No. I understood the word stalking but not the full structure behind it. I thought it was just personal harassment. Looking back, it was the early pattern of what became a long-term targeting process.
Section II – Transition to Targeting & Data Monetization
KB: One question that always strikes me is why us — why do they seem to select people with higher intelligence or creativity? Why not recruit us instead of target us?
AH: I don’t think they view targets as enemies. They see us as resources — data streams. Every targeted person becomes a marketing and research asset. They harvest information, biological data, neurological data, behavioral patterns — and they make money off it.
There’s a financial side: cryptocurrency trafficking operations, false records, AI-generated warrants. Law enforcement projects justify funding through “pre-crime” algorithms and facial recognition systems. It’s all marketed as public safety, but underneath, it’s a giant surveillance-for-profit ecosystem.
KB: So we’re not even talking about moral or ideological targeting, but an economic one.
AH: Exactly. Think about how entertainment venues or even theme parks run biometric capture systems. Disney’s “magic bands,” fingerprint scans, or full-body avatars — they say it’s for convenience, but it’s really data extraction. That information gets sold or fed into analytics firms — Palantir is one that integrates it all into usable intelligence products.
KB: That’s disturbingly plausible.
AH: It’s not isolated. Even drone footage, IoT sensors, and smart appliances feed the same market. Every device we use is another potential collection point. And criminals buy access — they literally pay for “slots” in the network to operate certain weapon systems or surveillance links. It’s a global black-market infrastructure.
Section III – Defensive Measures, Technology, and Mental Resilience
KB: When you’re trying to work, are you left alone or still interfered with?
AH: I’m attacked constantly. Sometimes I can block or reduce it, other times I just have to work through it. I’ve made a lot of changes in my environment: no LED bulbs — only incandescent. My windows are sound-proofed. I use wood barriers and EMF-dampening layers around meters and smart devices. My computer network has hardened security. That deters many attempts, but persistence is constant.
KB: You’ve probably seen what happens to most TIs — they end up reacting.
AH: Yes. And that’s what the perpetrators want. They love emotional reactions. If you yell or curse at them, they feed on that. So I’ve learned not to give them what they want. Calm neutrality is protection.
KB: I’ve said the same — it’s information they’re gathering. They watch emotional spikes.
AH: Exactly. They monitor brain activity, probably in real time. But one important point: not every attacker has the same skill set. Some hack phones. Others use medical or microwave systems. Some just run data analysis. It’s an entire workforce — drone pilots, signal techs, even logistics people. They each pay to connect to certain systems or regions through what’s called “frequency hopping.” It’s transactional.
KB: You’ve described the burns before — is that still your main symptom?
AH: Yes. Severe burns all over my body. That’s my main physical effect. I don’t get auditory voices, but that doesn’t mean V2K isn’t present. Many people have it without recognizing it because it manifests differently. Through my certifications in digital forensics and thermal tomography, I can identify weapon marks. Even if people can’t see them, they’re visible under analysis — thermal, spectral, or RF imaging.
I can often tell exactly where a person is being hit — abdomen, limbs, or head — before they even say it. The marks have patterns distinct from ordinary injuries.
KB: That’s remarkable.
AH: I’m holding some of that data back until my patents are finalized, but yes — the difference between weapon-system wounds and normal cuts is measurable.
KB: It makes sense. And in my own case, the main interference is cognitive — they dim my mind when I work.
AH: Right. They want you functional but dulled. That’s the cruel efficiency: keep you productive enough to harvest, but not dangerous enough to expose them.
KB: I’ve noticed that too — they remove the “turbo” from the brain but leave the engine running.
AH: Exactly.
Section IV – Innovation, Patents, and the TI Community
KB: Let’s talk about your technical work. In your earlier interview with David A., you mentioned an invention — can you recap that?
AH: Sure. It’s not my invention; it’s a software I was beta-testing called Visual Analyzer 25.78 from Pneumosoft.org. It’s a waveform generator and analyzer that, used properly, can help detect and desynchronize malicious signals within personal networks.
I didn’t code it, but I discovered how to use its mathematical sequencing to identify and offset certain attack frequencies. I provide installation guides and safety instructions for clients — mostly through my site, aimeesaudios.com or by email at aimeesaudios@protonmail.com.
I always tell people to download directly from the original developer’s website, not third-party links, because files can be tampered with.
KB: You’re careful. That’s good practice.
AH: It’s essential. Even PDFs can be altered. I proofread every document I send to ensure nothing was injected. Same for contracts — always verify every clause yourself.
KB: You also mentioned patents?
AH: I have one patent pending for the live-streaming detection system — it captures criminal activity in real time — and a medical patent filed for thermal-tomography scanning to identify directed-energy impacts. I’m currently finishing unit six of eleven on the first design, which should take another few years.
Meanwhile, I’m studying for my penetration-testing certification. Once that’s done, I’ll get insurance and expand into analyzing in vivo / in vitro communication systems — basically, biological-device hacking and shutdowns.
KB: That’s impressive. And you’ve influenced the community, too — the “vagus-nerve” research, for instance.
AH: Yes, that came from my scans. Every one of the hundred people I’ve scanned showed vagus-nerve involvement. I also introduced ideas like rubber mats and water-depth shielding — practical ways to manage certain frequency attacks.
Not all rubber works; different compounds absorb differently. Water can reflect or refract beams depending on weapon type — lasers, microwave, or sonic. There’s no single shield; it’s about matching materials to the threat spectrum.
KB: I’ve noticed that innovation in the community is rare. A lot of people just recycle information.
AH: True. Most focus on drama instead of development. There’s infighting, accusations of fraud or “perp” labeling. It’s destructive. I try to stay out of that and keep helping victims directly. I welcome constructive criticism — that’s how we learn.
I wouldn’t be doing what I do if any of the analysis and information weren’t real — why waste time on something fake when I’m trying to create a solution? Like with the software application: I may not get much feedback, but I know it works and has provided relief for victims; otherwise there wouldn’t be over 3,450 people watching the video and using it.
I’ve learned unique information — it’s all network-based, which is why Wi-Fi is important. If the criminals aren’t on that network, the software has no effect because you’re linked to the wrong Wi-Fi. Roughly 75 percent of these weapon systems are Wi-Fi-based. I also discovered that if you buy a new computer or laptop, the criminals haven’t had time to sync and connect it to their network, so that machine won’t show effects either because no one is in the system yet.
One last thing about the software: working with victims who are deaf or handicapped taught me that the V2K component can operate through a braille-bot interface.
Every person and victim who reaches out for help tells a story, and I match their experience with the equipment and programs being used in their attacks. Every day is a learning experience — another building block in understanding the whole criminal network on a global scale and market.
KB: I agree. It’s sad that creators doing real work get the least recognition.
AH: Right. Many prefer the comfort of echo chambers. But progress requires humility and experimentation.
Section V – Closing Reflections & Mutual Discussion
KB: Amy, I appreciate how you keep the focus on advancement. It’s rare.
AH: Thank you. I help victims daily — sometimes pro bono — producing reports, audio consultations, and forensic analyses. Many can’t afford the full reports, which are around $100, but I still assist where I can.
KB: You’re carrying a lot. Are you getting by financially?
AH: Barely, but yes. Everything goes into the business — equipment, training, certifications. I’m a penny-pincher. I saved for months to afford my recent $5,000 course. I even rented a billboard near SeaWorld in Florida that reads: “Directed Energy Weapons and Telecommunications – amysaudios.com.” It’s part awareness, part outreach.
KB: That’s fantastic. I’d like to contribute regularly if possible.
AH: There’s a donation link and GoFundMe on my website. I appreciate any help — it goes straight toward victim support and continued research.
KB: You’ve done so much already — court appearances, police communication, emergency advocacy. That deserves recognition.
AH: I’ve testified for victims, spoken with doctors, even acted as emergency contact for patients who needed a voice. Sometimes I mediate with police departments — one case moved forward only after we located a verified death threat in the communications. Proper documentation changes everything.
KB: That’s exactly the kind of credibility we need in this movement.
AH: The scope is widening — officers, politicians, even children are being hit now. I’ve intercepted comms where perpetrators bragged about targeting cops or senators’ families. If laws don’t evolve fast, nobody’s safe.
KB: It’s hard to feel sympathy for institutions that enable the system, though.
AH: True, but there are still good officers. Many are trapped by hierarchy and fear losing their jobs. Some chiefs are complicit because they control the funding streams. But not everyone’s corrupt — I’ve met honorable ones and written thank-you letters to them.
KB: I believe that. And for the record thanks for the interview and for your invaluable work.
AH: Thank you. I just keep moving forward. Innovation and faith — that’s what sustains me.
https://kasspert.wordpress.com/2025/...sible-weapons/
Last edited by Squareinthecircle; 23rd October 2025 at 00:11.
-
The Following 2 Users Say Thank You to Squareinthecircle For This Post:
Inversion (23rd October 2025), Nasu (22nd October 2025)
-
22nd October 2025 23:33
Link to Post #2
Re: Interview With TI Innovator Amy Holem
EDIT: fixed Amy's website link.
-
The Following User Says Thank You to Squareinthecircle For This Post:
Inversion (23rd October 2025)
-
23rd October 2025 00:04
Link to Post #3