+ Reply to Thread
Results 1 to 3 of 3

Thread: Interview With TI Innovator Amy Holem

  1. Link to Post #1
    Avalon Member
    Join Date
    4th September 2025
    Location
    California
    Language
    English
    Posts
    166
    Thanks
    194
    Thanked 554 times in 139 posts

    Default Interview With TI Innovator Amy Holem

    Signals, Shields, and Innovation for Survival: An Interview with Amy Holem Regarding her War on the Invisible Weapons



    From military police to digital forensics pioneer — how one woman turned targeting into technology


    Conducted by Kevin Boykin
    October 2025


    Section I – Early Military Experience & Harassment
    KB: Amy, let’s start with how this all began. When did you first start noticing harassment or surveillance behaviors?

    AH: It really began while I was still enlisted. If I went out somewhere alone — say a movie theater — my sergeant would show up in the same theater, sitting just a few rows away. If I went into a motorcycle shop, he’d walk in fifteen or twenty minutes later. It was constant tracking and tracing — complete harassment from someone in my own unit.

    KB: That’s terrible. And this was while you were serving as Military Police?

    AH: Yes, I was an MP. They’d make me sit on sergeants’ laps, force me to wear makeup even though it wasn’t required, and then make sexual comments all day. It was demeaning. The early 2000s — around 2001 to 2003 — was when the Army was just beginning to open combative MOS positions to women. At that time, the only true combat option for us was Military Police. We weren’t allowed into infantry or armor, only admin, medical, or supply.

    I wanted to serve in a combat capacity, so I chose MP. My PT scores were top of the class — I ranked seventh out of roughly 300 recruits, male and female combined. That didn’t matter. Inside the system it was always a male’s word against a female’s, and complaints went nowhere unless you were willing to risk your entire career.

    KB: Did you realize then that what was happening was part of something larger — what we’d now call “targeting”?

    AH: No. I understood the word stalking but not the full structure behind it. I thought it was just personal harassment. Looking back, it was the early pattern of what became a long-term targeting process.

    Section II – Transition to Targeting & Data Monetization
    KB: One question that always strikes me is why us — why do they seem to select people with higher intelligence or creativity? Why not recruit us instead of target us?

    AH: I don’t think they view targets as enemies. They see us as resources — data streams. Every targeted person becomes a marketing and research asset. They harvest information, biological data, neurological data, behavioral patterns — and they make money off it.

    There’s a financial side: cryptocurrency trafficking operations, false records, AI-generated warrants. Law enforcement projects justify funding through “pre-crime” algorithms and facial recognition systems. It’s all marketed as public safety, but underneath, it’s a giant surveillance-for-profit ecosystem.

    KB: So we’re not even talking about moral or ideological targeting, but an economic one.

    AH: Exactly. Think about how entertainment venues or even theme parks run biometric capture systems. Disney’s “magic bands,” fingerprint scans, or full-body avatars — they say it’s for convenience, but it’s really data extraction. That information gets sold or fed into analytics firms — Palantir is one that integrates it all into usable intelligence products.

    KB: That’s disturbingly plausible.

    AH: It’s not isolated. Even drone footage, IoT sensors, and smart appliances feed the same market. Every device we use is another potential collection point. And criminals buy access — they literally pay for “slots” in the network to operate certain weapon systems or surveillance links. It’s a global black-market infrastructure.

    Section III – Defensive Measures, Technology, and Mental Resilience
    KB: When you’re trying to work, are you left alone or still interfered with?

    AH: I’m attacked constantly. Sometimes I can block or reduce it, other times I just have to work through it. I’ve made a lot of changes in my environment: no LED bulbs — only incandescent. My windows are sound-proofed. I use wood barriers and EMF-dampening layers around meters and smart devices. My computer network has hardened security. That deters many attempts, but persistence is constant.

    KB: You’ve probably seen what happens to most TIs — they end up reacting.

    AH: Yes. And that’s what the perpetrators want. They love emotional reactions. If you yell or curse at them, they feed on that. So I’ve learned not to give them what they want. Calm neutrality is protection.

    KB: I’ve said the same — it’s information they’re gathering. They watch emotional spikes.

    AH: Exactly. They monitor brain activity, probably in real time. But one important point: not every attacker has the same skill set. Some hack phones. Others use medical or microwave systems. Some just run data analysis. It’s an entire workforce — drone pilots, signal techs, even logistics people. They each pay to connect to certain systems or regions through what’s called “frequency hopping.” It’s transactional.

    KB: You’ve described the burns before — is that still your main symptom?

    AH: Yes. Severe burns all over my body. That’s my main physical effect. I don’t get auditory voices, but that doesn’t mean V2K isn’t present. Many people have it without recognizing it because it manifests differently. Through my certifications in digital forensics and thermal tomography, I can identify weapon marks. Even if people can’t see them, they’re visible under analysis — thermal, spectral, or RF imaging.

    I can often tell exactly where a person is being hit — abdomen, limbs, or head — before they even say it. The marks have patterns distinct from ordinary injuries.

    KB: That’s remarkable.

    AH: I’m holding some of that data back until my patents are finalized, but yes — the difference between weapon-system wounds and normal cuts is measurable.

    KB: It makes sense. And in my own case, the main interference is cognitive — they dim my mind when I work.

    AH: Right. They want you functional but dulled. That’s the cruel efficiency: keep you productive enough to harvest, but not dangerous enough to expose them.

    KB: I’ve noticed that too — they remove the “turbo” from the brain but leave the engine running.

    AH: Exactly.

    Section IV – Innovation, Patents, and the TI Community
    KB: Let’s talk about your technical work. In your earlier interview with David A., you mentioned an invention — can you recap that?

    AH: Sure. It’s not my invention; it’s a software I was beta-testing called Visual Analyzer 25.78 from Pneumosoft.org. It’s a waveform generator and analyzer that, used properly, can help detect and desynchronize malicious signals within personal networks.

    I didn’t code it, but I discovered how to use its mathematical sequencing to identify and offset certain attack frequencies. I provide installation guides and safety instructions for clients — mostly through my site, aimeesaudios.com or by email at aimeesaudios@protonmail.com.

    I always tell people to download directly from the original developer’s website, not third-party links, because files can be tampered with.

    KB: You’re careful. That’s good practice.

    AH: It’s essential. Even PDFs can be altered. I proofread every document I send to ensure nothing was injected. Same for contracts — always verify every clause yourself.

    KB: You also mentioned patents?

    AH: I have one patent pending for the live-streaming detection system — it captures criminal activity in real time — and a medical patent filed for thermal-tomography scanning to identify directed-energy impacts. I’m currently finishing unit six of eleven on the first design, which should take another few years.

    Meanwhile, I’m studying for my penetration-testing certification. Once that’s done, I’ll get insurance and expand into analyzing in vivo / in vitro communication systems — basically, biological-device hacking and shutdowns.

    KB: That’s impressive. And you’ve influenced the community, too — the “vagus-nerve” research, for instance.

    AH: Yes, that came from my scans. Every one of the hundred people I’ve scanned showed vagus-nerve involvement. I also introduced ideas like rubber mats and water-depth shielding — practical ways to manage certain frequency attacks.

    Not all rubber works; different compounds absorb differently. Water can reflect or refract beams depending on weapon type — lasers, microwave, or sonic. There’s no single shield; it’s about matching materials to the threat spectrum.

    KB: I’ve noticed that innovation in the community is rare. A lot of people just recycle information.

    AH: True. Most focus on drama instead of development. There’s infighting, accusations of fraud or “perp” labeling. It’s destructive. I try to stay out of that and keep helping victims directly. I welcome constructive criticism — that’s how we learn.

    I wouldn’t be doing what I do if any of the analysis and information weren’t real — why waste time on something fake when I’m trying to create a solution? Like with the software application: I may not get much feedback, but I know it works and has provided relief for victims; otherwise there wouldn’t be over 3,450 people watching the video and using it.

    I’ve learned unique information — it’s all network-based, which is why Wi-Fi is important. If the criminals aren’t on that network, the software has no effect because you’re linked to the wrong Wi-Fi. Roughly 75 percent of these weapon systems are Wi-Fi-based. I also discovered that if you buy a new computer or laptop, the criminals haven’t had time to sync and connect it to their network, so that machine won’t show effects either because no one is in the system yet.

    One last thing about the software: working with victims who are deaf or handicapped taught me that the V2K component can operate through a braille-bot interface.

    Every person and victim who reaches out for help tells a story, and I match their experience with the equipment and programs being used in their attacks. Every day is a learning experience — another building block in understanding the whole criminal network on a global scale and market.

    KB: I agree. It’s sad that creators doing real work get the least recognition.

    AH: Right. Many prefer the comfort of echo chambers. But progress requires humility and experimentation.

    Section V – Closing Reflections & Mutual Discussion
    KB: Amy, I appreciate how you keep the focus on advancement. It’s rare.

    AH: Thank you. I help victims daily — sometimes pro bono — producing reports, audio consultations, and forensic analyses. Many can’t afford the full reports, which are around $100, but I still assist where I can.

    KB: You’re carrying a lot. Are you getting by financially?

    AH: Barely, but yes. Everything goes into the business — equipment, training, certifications. I’m a penny-pincher. I saved for months to afford my recent $5,000 course. I even rented a billboard near SeaWorld in Florida that reads: “Directed Energy Weapons and Telecommunications – amysaudios.com.” It’s part awareness, part outreach.

    KB: That’s fantastic. I’d like to contribute regularly if possible.

    AH: There’s a donation link and GoFundMe on my website. I appreciate any help — it goes straight toward victim support and continued research.

    KB: You’ve done so much already — court appearances, police communication, emergency advocacy. That deserves recognition.

    AH: I’ve testified for victims, spoken with doctors, even acted as emergency contact for patients who needed a voice. Sometimes I mediate with police departments — one case moved forward only after we located a verified death threat in the communications. Proper documentation changes everything.

    KB: That’s exactly the kind of credibility we need in this movement.

    AH: The scope is widening — officers, politicians, even children are being hit now. I’ve intercepted comms where perpetrators bragged about targeting cops or senators’ families. If laws don’t evolve fast, nobody’s safe.

    KB: It’s hard to feel sympathy for institutions that enable the system, though.

    AH: True, but there are still good officers. Many are trapped by hierarchy and fear losing their jobs. Some chiefs are complicit because they control the funding streams. But not everyone’s corrupt — I’ve met honorable ones and written thank-you letters to them.

    KB: I believe that. And for the record thanks for the interview and for your invaluable work.

    AH: Thank you. I just keep moving forward. Innovation and faith — that’s what sustains me.






    https://kasspert.wordpress.com/2025/...sible-weapons/
    Last edited by Squareinthecircle; 23rd October 2025 at 00:11.

  2. The Following 2 Users Say Thank You to Squareinthecircle For This Post:

    Inversion (23rd October 2025), Nasu (22nd October 2025)

  3. Link to Post #2
    Avalon Member
    Join Date
    4th September 2025
    Location
    California
    Language
    English
    Posts
    166
    Thanks
    194
    Thanked 554 times in 139 posts

    Default Re: Interview With TI Innovator Amy Holem

    EDIT: fixed Amy's website link.

  4. The Following User Says Thank You to Squareinthecircle For This Post:

    Inversion (23rd October 2025)

  5. Link to Post #3
    United States Avalon Member
    Join Date
    19th March 2016
    Posts
    2,491
    Thanks
    27,968
    Thanked 14,842 times in 2,369 posts

    Default Re: Interview With TI Innovator Amy Holem

    The following is a repost about the books The Invisible Crime 1 & 2. He's explained how they use implants that emit low level microwaves to burn victims' skin from the inside out.

    Project Camelot Interviews Michael Fitzhugh Bell: Synthetic Telepathy & Secret Societies
    Quote The following are notes I took for Michael's books. I made some additions, so there may be slight discrepancies.

    The Invisible Crime: Illegal Microchip Implants and Microwave Technology and Their Use Against Humanity.

    Psychotronic weaponry is what they use on him. That’s derived from combining psychological and electronic also known as non-lethal weaponry and is used as a revenge tactic. They can cause instant staged heart attacks, car accidents, strokes, cancer, tumors and debilitating mental disorders. This can come from a neighbor’s house, van parked down the street, satellites or cell towers. The birthplace of these technologies comes from Project Paperclip and MK-Ultra.

    Isolating the Target is the goal of the perpetrators. To strip the person of all privacy, harass, humiliate, mock, assault, rape, defile over and over. It usually drives the Target into committing suicide. These crimes are carried out by sociopaths and psychopathic individuals with no conscience.

    V2K is voice to skull technology and has been around since 1974.

    The gang stalkers will use a malicious rumor campaign and say the Target is a criminal, gay, pedophile or out to undermine the federal government.

    Michael would have a Japanese neighbor walk out of his apartment at the same time he did every day. This is a tactic he calls Enter/Exit.

    One of the ways thoughts are placed inside Targets minds is via a system known as silent subliminal sound techniques.

    Aerial or Air Stalking- Helicopters will hover over your residence on a consistent basis. If reported local authorities will deny it’s one of theirs and news stations will say they had no chopper in the area.

    Brighting- Is where the perpetrators will flash their high beams at you from oncoming traffic to let to know they are always there and know where you are.

    Crowding- Is where they will cut in front of you in line at a store.

    Marking- They will enter your residence and put holes in your clothes. They’ll usually put a hole next to a button just below the neckline, in the crotch and armpit area.

    Street Theater- (This one contains some of my own additions). These are fake scenarios they use to set people up. They could be staged auto accidents, dispute between couples, locking keys in a vehicle, false car problems, ask to use someone’s landline, people who will intentionally dress as homeless, fornication or raping someone in front of a Target’s home. They will pose as a phone company employee, Gas Company, water & power, cable employees. They will pay your neighbors to perpetuate the terror campaign.

    Distractions- (This one contains some of my own additions). These could be Whistling, humming, sneezing, coughing, crying, screaming, running power tools or lawn equipment, tapping, clapping, jingling of keys, slamming vehicle doors, chirping car alarms, intentionally setting alarms off, an evil stare or bumping into a Target, bouncing basket or soccer balls, intentionally setting off car alarm, honking horns, repeated use of fireworks.

    Provocateur- Is someone or group of people that will enter a peaceful crowd of protestors to instigate the provocation law enforcement needs to disperse them. Often times these people actually carrying badges or are known snitches.

    Mail interception- They can prevent any piece of mail from arriving at your house. They will intentionally deliver your mail to your neighbors who work for the people harassing you. They will steal outgoing mail to get your personal information.

    Bell has labeled three groups: Grunts or Henchmen who honk horns and yell obscenities at passing Targets. Operators provide disinformation about a Target and a photo of them in a lewd act. Sandmen operate in groups of three and drug, rape and abduct people.

    These secret groups operate above the law and is why there’s no recourse against them. It’s also why all of law enforcement, medical and mental health industry globally are powerless to do anything about the problem. They’re all essentially being held hostage and can be categorized as having Stockholm Syndrome.

    There is literally a worldwide media blackout on organized gang stalking, electronic harassment and mind control.

    He stopped driving his car to avoid any more staged accidents. Just after detailing his car they would key it or damage the mirror. One time they threw a brick wrapped in plastic at his car from a moving van while he was driving. It deployed the passenger’s side airbags and broke the side windows. After he stopped they sprayed him in the face with aerosolized scopolamine. He got on the freeway to escape and ended up stopping at a 7/11. Minutes later police officers pulled in and gave him a sobriety test then put him a hospital for a fifteen day psychological evaluation. Those officers worked in collusion with the perps.

    While walking the streets he had a problem with a convoy of perps honking their horns, flashing their lights, revving their engines and dropping them into a lower gear to sound louder. This tactic is called Mobbing and is intended to frighten and anger the Target.

    He was attacked by a Hispanic male with a leaf blower. As he passed the man he pointed the blower directly at his face and it blurred his vision for three days.

    Perps will use dream insertion or the dream machine with the EEG fingerprint.

    A device known as a pneumatic brain radio transsphenoidal injection-implantation tube, injects a neural spike radio transmitter into the hippocampus nerve. This endoscopic pituitary surgery or injection into the soft tissue of the hypothalamus makes the Target a SLAVE or ROBOT.

    Recommended electronic countermeasures are a Spectrum analyzers, frequency counters and energy measurement equipment. Silver and nickel blanket, rare earth magnets and creating an electro-static egg to throw off their technology.

    Michael counted 100-150 tiny one centimeter scars all over his body.

    He had to fly to Europe to get his implants removed, but they wouldn’t help him either. If you say it’s a piece of glass and causing you pain they will remove it. If it’s an implant with a purpose they dare not attempt extraction because of fear of retaliation. They commonly threaten to pull medical licenses if implants are removed or even spoken about.

    Harassment could involve spitting, menacing, staring, mocking, taunting, laughing, flashing lights, honking horns, blasting music, yelling, swearing and finger gestures.

    Scopolamine is derived from a tree known as Borachera which grows around Colombia.

    He was forced to One Time everything meaning he could never leave leftover food in his apartment for fear of it being drugged or poisoned.

    The newer implants technologies are nearly impossible to detect. Hitachi makes the smallest ones which are referred to as microdust or powder.

    The navel is the most common area to be implanted then the skull, nose, hands and behind the ears.
    RF implants are often installed within the V between the thumb and forefinger. They are also installed on the inside and outside of the knees, quadriceps, calves, ankles, back, arms, shoulders and back of the neck.

    White hair patches on Target’s hair is from the implants constant low level microwave radiation. This is different than grey hair.

    Implants can be placed in food then they attach themselves to the lining of the intestine and scar over. On an MRI it will appear as bright white or a dark void.

    Perpetrators, even shadow government groups have been known to dress up in alien costumes or wear alien masks in order to further confuse and discredit victims.

    He said in order to go forward in fighting this horrific tyranny you have to consider yourself as a dead person and you have nothing to lose.

    His book will smoke-out the people who have been implanted, brainwashed and abducted.

    He complained at UCLA medical center and was locked up in a psych ward again for another fifteen days.

    He recommended a Kodak Zi8 digital camcorder to film perpetrators as a deterrent.

    People have asked him “Why would anyone want to do this to you?” It seems retrocausation is the broad-spectrum answer. Everything I’ve looked at points to FOREKNOWLEGE and REPTILIANS (my addition).

    The Invisible Crime Part II:

    P. IV- He did not ask for this battle. If it was part of his incarnation agreement then he did (my addition).

    P. VI- He had a former CIA agent help him, but couldn’t reveal his name. He said his book(s) were only the tip of the iceberg.

    P. IX- The syndicate responsible for the targeting is called The Organization. All targets have been placed on an international watch or terror list.

    P. X- Local fire department & police departments can be utilized for targeting. Psychological attacks have no trace evidence.

    P. XI- Continual harassment keeps the target in a constant shell-shocked state.

    P. XIII- Total mind control would eliminate the need for war.

    P. 8- A Signature or Hard target is someone that is heavily targeted. The following isn’t on P8. They are the 1% of the 1%. He said 1% percent of the world’s population is a target or about 75 million. Michael is one of 750 thousand. It is believed that one in five people are participants in the targeting program. He wrote that they spend 4 billion dollar a year for every one thousand targets.

    P. 11- An estimated 50% of Americans are chipped with RFID without their knowledge.

    P. 14- He’s a screenwriter and wants to see his work on the big screen.

    P. 22- California has the largest concentration of TI’s followed by Texas, Florida, Michigan & New York.

    P. 25- He said he created a mental anesthesia to cope with the harassment.

    P. 50- He wrote about Brain Resonance Frequency or BRF.

    P. 60- He found small incision scars on his friends and family like the ones he has, but claims they’re not targets.

    P. 62- On this page he has a list of master chips that are placed in the body.

    P. 85- On this page there’s a list of companies that participate in targeting activities.

    P. 89- The criminals take orders from their alpha leader controllers. That sounds like a reptilian MO (my addition).

    P. 89&90- They’ll remove products from store shelves that you want to buy and put them back when you leave.

    P. 90- Fear is the oxygen of terrorism.

    P. 92- Doxing is a term used by perpetrators to disseminate information about the TI to neighbors & co-workers. TI’s are controlled by a hyperdimensional matrix.

    P. 98- The crime has three parts: Organized Stalking, electronic torture & mind control.

    P. 110- This page contains a list of things that indicates a TI is being mind controlled.

    P. 133- This page has the different categories of perpetrators.

  6. The Following 3 Users Say Thank You to Inversion For This Post:

    Jeksey (Yesterday), Lilyofthestars (Yesterday), Squareinthecircle (23rd October 2025)

+ Reply to Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts