Directed Energy Weapons
The Energy Weapon, The Network & The Children
A breakdown of a tip letter sent to the U.S. Attorney for the Southern District of New York — detailing alleged directed-energy technology, a national sex trafficking network, and the systematic abuse of children
Within the publicly released Epstein file archive sits a letter — logged as EFTA00080475 — sent directly to the United States Attorney's Office in New York. The anonymous author describes three interlocking things: a technology capable of remotely attacking the human nervous system, a national trafficking organization they call the "Ashley Madison network," and the systematic sexual abuse of children through both. This is a full breakdown of those claims.
The United States Attorney's Office for the Southern District of New York — the "Mother Court."
The SDNY is the oldest federal court in the history of the United States and is described as "the preeminent trial court in the nation." It is the court that holds jurisdiction over America's largest financial institutions, its most significant white-collar prosecutions, and its most consequential federal criminal cases. This is not a regional office. It is the apex of the American federal prosecutorial system — and this letter was addressed directly to its sitting U.S. Attorney, Geoffrey Berman, at 1 St. Andrew's Plaza, New York City.
That the author chose this specific office matters. That what happened next — publicly — was nothing, matters more.
A letter filed with the top federal prosecutor in New York, buried inside the Epstein archive, describes a nationally coordinated sex trafficking and child abuse network still active after Epstein's death. The author claims to have lived next to it, watched it operate, and witnessed its participants firsthand. The letter ties directed-energy weapon technology, residential infiltration, child molestation, kompromat, real estate fraud, and a platform built from the ground up to arrange secret affairs — into a single connected criminal system. And it directly implicates that system in Epstein's death.
- Someone filed a detailed, specific, location-based tip with the SDNY about an active trafficking network — and nothing public ever came of it.
- The network allegedly uses real people housed in real apartments to run energy weapon equipment — RF signals layered with audio and video, hidden in plain sight as satellite dishes on ordinary residential buildings.
- The technology is claimed to induce hallucinations, simulate sexual assault, and drive targets to suicide — remotely, invisibly, leaving no physical evidence.
- It was allegedly used on Epstein while he was in federal custody — raising direct questions about the circumstances of his death.
- Children are described as primary targets — abused remotely through the same technology, making detection and prosecution nearly impossible.
- A kompromat library identical in type to Epstein's was allegedly stored on a computer inside a residential building in New York City.
- The network's wealth was built through real estate — properties acquired through the organization and transferred to participants, some as minors.
- A named but redacted individual at Deutsche Bank is alleged to be managing the network's funds — Deutsche Bank was already fined over Epstein-linked transactions.
- The "Ashley Madison" name is not random. The platform was built from day one to arrange extramarital affairs, marketed to married people seeking secret encounters, and criticized as "a business built on the back of broken hearts." It ran 70,000 bots, retained everything users thought was deleted, and produced suicides and mass extortion after its breach — every element of its model mirrors how this network is described as operating.
- Epstein's powerful associates did not disappear after his death — the document says they remain active, pointing toward a specific class of wealthy art patrons as the most protected among them.
01 The Energy Weapon System
The most technically detailed and alarming section of this letter describes what the author calls a radio transmitter system — a technology they allege is deployed deliberately across residential properties and used as a weapon against targeted individuals.
The Housing Model — How Operators Are Deployed
Before anything else, the document makes clear how this system is physically set up — and the method is deliberately ordinary. The author states that "much of the property is used to house people with radio transmitters." This is not describing equipment placed in empty buildings or hidden facilities. The network acquires residential properties — apartments in normal residential buildings — and uses those properties to house individuals whose function is to operate the transmitter equipment from inside their home.
The operator lives there. The apartment looks like any other apartment. The equipment runs from within it. The author describes witnessing this firsthand across multiple units in their own building:
- The neighbor directly next door to the author was a transmitter operator living in that apartment
- The current resident who moved in after also transmits from the same unit
- The neighbor directly across the hall transmits from his apartment
- The building owner transmits from his own separate apartment in the building
This is the operational model the document describes: property is acquired, a person is housed inside it, and that person deploys the technology from their residence. From the outside it looks like a tenant living in an apartment. The transmitter equipment — visible, the author notes, as satellite dishes on the exterior — is the only outward sign.
What the Transmitters Are and What They Emit
The transmitters themselves are not hidden — the author states they are often visible from the street as satellite dishes mounted on buildings. The signal they emit is described as a simultaneous combination of radio frequency (RF), audio, and video. These are not three separate transmissions. They are one layered signal, and the layering is deliberate.
RF is the delivery layer. It penetrates walls, building materials, and the human body. Audio and video are not broadcast separately — they ride on top of the RF carrier. The RF gets the signal through any physical barrier. The audio and video are what's carried inside it.
This distinction matters because the document makes the purpose explicit: the CNS interference described is not a byproduct of the transmission. Neurological disruption is the signal's purpose. The transmitter isn't broadcasting information. It's broadcasting experience.
How the Technology Works — The Recording Mechanism
The letter explains a specific technical process. First, a recording is made of a person while they are near a transceiver — capturing signals associated with their body and physical sensations. That recording is then broadcast outward via the transmitter. Anyone who receives that broadcast begins to experience sensations that mirror those of the person in the original recording.
This is what separates the system described here from a standard jamming or disruption weapon. A jamming weapon creates interference. What the document describes creates an experience.
A person near the transceiver becomes the source material. Their body's signals — sensations, physical states — are captured. That capture is encoded and rebroadcast. The person on the receiving end doesn't get noise or static. They get a copy of another person's physical experience.
This is essentially a sensory playback system — a library of recorded bodily states that can be transmitted on demand to anyone within range. The target's nervous system doesn't register an external attack. It registers an event.
The author states that through the combination of the radio signal recording and what they call "conditioning techniques," targets begin to experience tactile, auditory, and visual hallucinations — sensations that often resemble sexual interactions with other people. The author refers to this as a "Ham Radio technique" — describing the underlying method as derived from amateur radio practices, but deliberately weaponized.
That phrase carries specific weight. It means:
- Civilian-origin technology — not a classified military program built from scratch
- Adapted and weaponized — the method existed in amateur radio practice before it was turned into this
- Accessible infrastructure — satellite dishes visible from the street, not concealed hardware
- Pre-documented — the technique was already recorded somewhere in amateur radio literature before it was repurposed as a weapon
What Targets Experience
The document describes three categories of induced experience:
- Tactile hallucinations — physical sensations with no external cause, including sensations of being touched or violated
- Auditory hallucinations — hearing voices or sounds, making targets appear mentally ill to outside observers
- Visual hallucinations — seeing things that are not present
Tactile, auditory, and visual are not independent effects delivered in isolation. They constitute one unified perceptual event — a complete manufactured reality delivered simultaneously to the target's nervous system.
The target is not experiencing a symptom of something. They are experiencing what feels, to them, like an actual event. The induced sensory input is indistinguishable from real sensory input. That is the document's sharpest technical claim — and it has a second edge.
The target cannot tell the difference. And critically, neither can anyone observing them. To an outside observer, the target appears to be in psychiatric crisis — hearing voices, describing impossible sensations, reacting to stimuli no one else can perceive. The document's explanation is that they are responding, accurately, to a real external signal that the observer has no way to detect.
Driving People to Suicide
The document states plainly that driving people to suicide is a common practice among those who operate these transmitters. The author then makes a direct and specific claim: this same technology was used to communicate with and harass Jeffrey Epstein while he was held in prison. Epstein died at the Metropolitan Correctional Center in August 2019. His death was ruled a suicide. The circumstances — malfunctioning cameras, guards who fell asleep, a broken protocol — have never been fully resolved.
Other Documented Uses in the Letter
- Simulating break-ins and home invasions — replicating the sounds and physical sensations of an intrusion without any physical entry
- General ongoing harassment and disruption of targets' daily lives
- The remote sexual molestation of children — described in the document as an extensive, deliberate use of this technology
These claims do not exist in a vacuum. The U.S. government's MKULTRA program — declassified after Congressional hearings in the 1970s — documented decades of non-consensual experimentation on human perception, behavior, and psychological manipulation using technology, drugs, and conditioning. More recently, Havana Syndrome — neurological symptoms suffered by U.S. diplomats and CIA officers in Cuba, China, and other locations — was investigated by the National Academy of Sciences, which concluded in 2020 that directed pulsed microwave energy was the most plausible explanation. The symptoms reported by Havana Syndrome victims include exactly what this document describes: sensations of pressure, sound, and physical interference with no visible external cause. The claims in this letter are more extreme, but they operate within the same documented technological space.
02 The "Ashley Madison Network"
The author uses the term "National Ashley Madison sex trafficking network" to describe the organization they allege sits behind both the transmitter technology and the child abuse. The name — referencing the infamous infidelity website — appears to be the author's own label for the syndicate, not an official designation.
What the Network Is Alleged to Be
According to the document, this is a nationally coordinated prostitution, child molestation, and sex trafficking operation. It is not described as a local or isolated criminal enterprise. The author states that groups from across the country were coordinated to converge in New York City over the two years prior to the letter being written — suggesting active, ongoing national organization at the time of writing.
Leadership of the network is attributed to a married couple — both names fully redacted — who the author describes as having built their entire family wealth through this organization over decades. Their children are also described as involved.
The Transmitter System as a Network Tool
The document makes clear that the energy weapon technology described in Section 01 is not separate from the trafficking network — it is a core operational tool of the network. The transmitters are used not only to harass individuals but, according to the author, to facilitate the abuse itself: conditioning victims, controlling behavior, and — most disturbingly — enabling remote molestation.
The Epstein Associates Still Active
The letter does not treat Epstein's death as the end of the story. The author states explicitly that many of Epstein's wealthy and well-known personal associates remain active in the organization. Rather than naming them directly, the author offers a descriptive profile: they are described as wealthy, aristocratic art patrons with eponymous museums — a pointed and specific social description that stops short of naming names while still directing investigators toward a recognizable class of individuals within Epstein's known social world.
The Deutsche Bank Connection — Network Finances
One of the most specific financial allegations in the document concerns a named but fully redacted individual described as working at Deutsche Bank — alleged to be the person managing the network's funds. The significance of that institution in this context is not incidental. Deutsche Bank was fined $150 million by New York State regulators in 2020 for compliance failures tied directly to its relationship with Jeffrey Epstein — failures that included processing suspicious transactions and ignoring red flags after Epstein had already been convicted of sex crimes. The document's claim that a Deutsche Bank employee was actively managing this network's money adds a specific and pointed financial dimension to allegations that, until now, the bank's own settlement acknowledged only in the most procedural terms.
03 The Child Abuse
The abuse of children is described throughout this document not as a peripheral element but as a central and deliberate function of the entire system — both the technology and the network.
Remote Abuse Through the Transmitter System
The author states that the radio transmitter technology is used extensively to molest children. The mechanism described is the same as that used against adult targets — the induced tactile hallucinations and conditioning — but directed at children. The implication is that children can be made to experience sexual sensations remotely, without physical contact, through the signal system. This would make detection and prosecution of the abuse extraordinarily difficult, as there is no physical crime scene in the traditional sense.
The Kompromat Library
The author claims that within the residential building they describe — which serves as the geographic center of the document's allegations — a specific location contains a large child pornography library stored on a computer. The author then makes a direct connection to Epstein: they state this is the same type of material that Jeffrey Epstein kept and used as kompromat — compromising evidence held over powerful people to ensure their silence, loyalty, and continued participation. This is consistent with what federal prosecutors and investigative journalists have alleged about Epstein's operating methods.
The Underage Property Transfers
The document contains an allegation that connects child exploitation directly to the network's real estate operations. The author states that one apartment in the building was transferred to an individual when they were 17 years old — a minor — as part of the network's practice of rewarding participants with property. A separate apartment is described as having been acquired by a father through the underage prostitution organization and then passed to his son as a teenager. These are not incidental details — they describe a system in which children and minors were drawn into, rewarded through, and effectively inducted into a criminal network through property and financial incentives.
The Conditioning Component
Throughout the document, the word "conditioning" appears repeatedly alongside the technology descriptions. This is significant. The author is not describing a purely physical weapon — they are describing a system that combines the physical signal with psychological conditioning over time. This is precisely the methodology documented in MKULTRA: repeated exposure, induced experience, and behavioral shaping. Applied to children, this would represent one of the most severe forms of psychological and sexual abuse conceivable — invisible, deniable, and leaving no physical evidence.
04 The Ashley Madison Name — This Is Not a Coincidence
The anonymous author of this letter did not pick the name "Ashley Madison" at random. They use it consistently — "the Ashley Madison network," "the National Ashley Madison sex trafficking network" — as though it is a recognized operational name, not a casual label. When you examine what Ashley Madison the platform actually was, and what happened to it, the overlap with the document's core allegations is too precise to dismiss.
Ashley Madison launched in 2002 with an unambiguous purpose: connecting married people — and people in relationships — who wanted affairs. Not dating. Not companionship. Affairs, specifically, with secrecy as the product. Its tagline said it plainly: "Life is short. Have an affair." It was criticized from early on as a "business built on the back of broken hearts, ruined marriages, and damaged families." Singapore's government refused to let it operate at all, stating it "promotes adultery and disregards family values." None of that slowed it down. By 2015 it claimed 37 million users. By 2019, 60 million.
What it actually was, underneath the surface, is more relevant to this document than the headline numbers. The platform ran over 70,000 bots sending fake messages to male users. Its own terms of service contained a clause acknowledging that many profiles existed "for amusement only." A former employee sued the company after being assigned to create over a thousand fake female profiles to attract paying customers. The entire ecosystem — the affairs, the discretion, the guarantee of secrecy — was manufactured from the start. A false surface built to draw people in and capture what they were willing to do in private.
37 Million People's Sexual Secrets — Instantly Available
In July 2015, Ashley Madison was hacked by a group calling itself The Impact Team. The entire customer database — real names, home addresses, sexual fantasies, credit card information, and email addresses belonging to 37 million people — was stolen and publicly released. Every one of those people had voluntarily recorded their most compromising secret inside a system that promised it would never leave. For any network whose operational model depends on kompromat — compromising material held over people to ensure silence and control — this was not a crisis. It was a windfall. The Epstein document describes at length how such material is used to control powerful individuals. Ashley Madison's breach created the largest ready-made blackmail database in history, drawn entirely from people who had self-selected into it. Someone had access to all of it, privately, before it was ever released to the public.
The "Full Delete" That Deleted Nothing
Ashley Madison offered users a paid service — pay $19 and all your data, messages, history, and photos would be permanently erased. The 2015 breach revealed that this "permanent deletion" feature did not permanently delete anything. All data was retained and fully recoverable. A network that retains everything on everyone — that is the architecture of a blackmail operation. Every secret is permanently on file. Nothing is ever truly gone.
Suicides — The Same Outcome the Document Describes
The Epstein document states plainly that driving people to suicide is a common practice of this network. Ashley Madison's breach produced the same outcome. Toronto Police publicly spoke of suicides associated with the leak of customer profiles alongside widespread extortion attempts. The mechanism is identical in both cases: expose a person's sexual secrets, threaten to destroy their private life, and the person is broken. The document describes this as a deliberate, practiced tactic. Ashley Madison's aftermath showed it working at mass scale on millions of ordinary people.
The Extortion Model Running at Industrial Scale
After the breach, Ashley Madison users worldwide began receiving extortion emails demanding bitcoin payments in exchange for silence — threatening to send proof of affairs directly to spouses. This is the kompromat model running automatically and at scale — the same method the Epstein document describes being deployed against powerful individuals, now industrialized against millions. The infrastructure is identical. Only the targets differ.
Built on Fake Identities and Manufactured Deception
The bots, the fake profiles, the "amusement only" clause buried in the terms of service — none of it was incidental. Ashley Madison's architecture was deception operating at every level: fake women, fake interactions, a fake promise of permanent deletion, and a real product built underneath all of it that was collecting and permanently retaining everything users thought they were doing in private. The Epstein document describes a network built on exactly the same structural principle: ordinary-looking apartments concealing covert equipment, ordinary-looking residents concealing operations, a completely normal surface over a coordinated criminal system running underneath it. The method is the same. Only the scale and stakes differ.
What the Name Choice Means
The document's author demonstrates detailed firsthand knowledge of this network — specific apartments, specific people, specific dates. They chose to name it after Ashley Madison deliberately. The possibilities are not mutually exclusive. The platform may have been used as a recruitment tool — identifying and approaching vulnerable targets. It may have been used as a victim sourcing tool — finding people already engaged in secrets and therefore already compromised. Its database — never truly deleted, retained in full — may have been a direct kompromat source. Or the name may reflect that the network's methods and Ashley Madison's methods were operationally identical: secret data, fake identities, manufactured scenarios, and the permanent retention of everything that could destroy a person. Whatever the connection, the name in that document is a thread that has never been publicly pulled.
05 The Unresolved Questions This Document Raises
This letter was filed with the most powerful federal prosecutor's office in the United States, at the height of the Epstein investigation. The author made specific, named (though redacted), location-specific claims about technology being used on children, about a national trafficking network still operating after Epstein's death, and about Epstein himself being targeted by this technology while in federal custody.
When Was This Letter Written — The Temporal Record
The document does not carry a filing date in its public release, but the text itself provides enough internal evidence to establish a credible window. The honest reading is methodical: some dates are hard, some are relative, and one contains the author's own uncertainty.
2018 — The author states they observed a redacted woman and her companion entering the neighboring apartment "when ak was the tenant in 2018." A specific year, attributed to firsthand observation.
August (?) 2019 — The author places the redacted husband entering the same apartment around this time. The document actually includes a question mark — written as "August (?) 2019" — meaning the author themselves was not fully certain of the month, only the year. That uncertainty is preserved in the original text.
"Recent months" — used when describing the family amassing tens of millions in real estate. No fixed date. Relative to when the letter was written.
"Last two years" — used when describing coordinated groups converging in New York City. Again relative, not fixed.
Epstein is referred to throughout as "the late Jeffrey Epstein" — meaning the letter was written after his death in August 2019.
The letter is addressed to Geoffrey Berman, who served as U.S. Attorney for SDNY from January 2018 to June 2020 — placing an upper bound on when it could have been filed and received.
What was done with this letter is unknown. Whether the specific building was investigated, whether the named individuals (whose names remain redacted in the public release) were interviewed, whether the alleged computer on the fourth floor was ever examined — none of this is part of the public record.
What is part of the public record is that Epstein's death was never fully explained. That his network of associates has faced minimal accountability. That directed-energy technology capable of causing neurological effects in targeted individuals is real and government-documented. And that the sexual abuse of children through his network extended far beyond what has been prosecuted.
This document adds a specific, detailed, and deeply disturbing layer to that unresolved picture.
Comments
Post a Comment