This particular item is ultimately the most used and is often referred to as v2k or voice to skull and is used extensively in the psychological breakdown of the. Webthe present invention relates to a method to identify who is victims of abuse voice to skull and remote neural monitoring technology to and identify who is remote attacker or. The technology involves a.