View Single Post
  #1   Report Post  
Old September 6th 18, 01:34 AM posted to rec.radio.shortwave
fred k. engels®[_30_] fred k. engels®[_30_] is offline
external usenet poster
 
First recorded activity by RadioBanter: Sep 2018
Posts: 1
Default How to Defeat Remote Neural Monitoring and Mind Control

If you have a hard time understanding how remote neural monitoring
(RNM) works, just think of how a lie detector works. In theory RNM
functions in similar manner to a lie detector: by measuring
physiological responses emitted by the body. In RNM, it is those
physiological responses emitted via electromagnetic impulses by the
brain.As you learn to defeat the predictive capabilities of the system
— quenching, redirection, multi-tasking and spontaneity— their attempts
to restrict your reference choices will become increasingly evident and
you will begin to perceive what I will describe as ‘functional or focal
duality’ within your working memory. The perps system’s prediction
error rate will dramatically increase and its attempts to predict your
thoughts or intentions will become humorous if not simply annoying.1.
Multi-Tasking

Learn how to multi-task as multi tasking causes you to think in
multiple threads. When you are constantly thinking in multiple threads
(multiple tasks or thoughts) then there is no coherent pattern for the
perps to establish and integrate into RNM data. In other words,
‘integration completion’ between the RNM system and your brain is
hindered and without your response to that specific ‘impulse
injection’, the RNM verification process is breaks apart.

The perps are using a ‘fabricated or falsified stream’ to interfere
with your memory and thought process. Once you become dependent (ie.
you believe their impulse injections are your own) on the system’s
output (or they believe your responses to it are consistent) they will
begin to fabricate ‘subconscious responses’ which they will pretend are
indicators of honesty/dishonesty, positive recognition, anxiety, etc,
and they will use ‘impulse injection’ to convince you that the
fabricated responses are your own.

If you are unaware of this constant mental manipulation the system will
begin to shape your thoughts and behavior. They will use this to
[attempt to] restrict your thoughts and behavior by blocking
[interfering with] your memory and thought process while these
suggestions (injected impulses) are being provided – the interference
is triggered and can be activated at will by the attackers.

2. Spontaneity

Never follow a set pattern of conduct. Always change your behavior
every day at a moments notice. Do this when your quickly (not slowly)
on the move as it is more difficult for their remote neural system to
monitor your thoughts while your in rapid motion.

If you decide to go to the grocery store go to the convenience store
instead. Change it up everyday but don’t do the same things over and
over as that establishes a pattern of conduct. Remember they are trying
to alter your daily motives and emotional perceptions.

The remote neural monitoring system is designed to provoke you
emotionally so they can generate response statistics which the system
will use to determine how to interpret and link descriptions with data
captured about your memory references.

Once they have consistent statistics the system will use previous
‘references’ and inject them into your subconscious thought during
normal activity which is also referred to in ‘impulse injection’ to
convince you that the response was your own and influence you to
complete or describe the reference by making the appropriate
verbalizing or performing a related action. You can fight and/or
control this if you learn to defeat these memory attacks.

This same remote neural attack can be used to disrupt your speech if
the attackers decide to prevent you from discussing a specific topic or
repeating a given word. The system can be configured to disrupt your
recollection when formulating a related statement or inject gibberish
[triggered substitution] while you are attempting to speak.

The goals of these attacks appear to be Censorship, Memory Management,
and Direct Behavior Control. However these people are not concerned
with legal constraints or any particularly acceptable way of life. They
simply use anything you enjoy or appreciate to abuse you regardless of
your behavior so if they give you a compliment, realize that they are
only doing it to see how you will respond when they negate it and
torture you nightly.

If you keep a constant handle on your ‘state of activity’ as well as
your situational perception you will recognize conflicting impulses and
although it is possible for the system to overpower your impulses, if
you understand the attacks you will be able to recognize the physical
changes resulting from these powerful impulses and this should prompt
you to re-evaluate your current state.

Unless you have been tortured to near-incoherency you should be able to
fight the system’s influences. These remote neural attacks are most
effective when you are stepping through sequenced tasks so try to avoid
‘zoning’ on your activities. How? By changing your actions and
activities randomly & constantly at the speed of thought. Don’t always
plan out or think out your daily itinerary, if you don’t have to.
‘Just do it’ !

Remote neural manipulation is accomplished via their system’s ability
to interpret your thoughts and is wholely dependant on its ability to
predict and influence your ‘reference’ choices or impulse sequencing
during thought composition. The system maps patterns with impulses and
identifiers (evoked potentials) and uses statistical data about your
‘composition habits’ to predict how you will think or act as you begin
to formulate thoughts or prepare to act. The system’s ability to define
and map these references intelligibly depends on your cooperation [or
ignorance] and the attackers’ ability to make sense of what they see
visually or what they can guess based on your past activity.

3. Quenching

They will constantly run you through a ‘verification’ routine where the
system probes you for a particular set of responses repeatedly in order
to establish a pattern. If you are interacting and countering these
probes the operator will vary the routine in an attempt to ‘verify’ via
different methods. Once the system ‘verifies’ the selected responses
they will be used in the next wave of harassment routines – the process
is endless and you will see the effects clearly if you are consistently
defeating the system. If you are not defeating the remote neural system
then you will not see or notice the effects. [Annotation: This suggests
learning and feedback from the target, who is apparently a sort of
“node” in artificial intelligence.] The way to defeat their remote
neural monitoring system is by ‘quenching’.

You ‘quench’ remote neural monitoring by interacting with and
countering their tactics. None of what these people are collecting
could ever be used in a case against you. Every piece of information
collected by their system can be considered falsified and/or fabricated
because the system is designed to continuously provide ‘suggestions’
according to data which has been previously collected about your
current activity and the accuracy of the reference descriptions
[definitions] is extremely low since the attackers don’t really care
about truth and the system will fabricate statements and/or imagery
while they are abusing you. The fabrications are generally the result
of misinterpretation of references and emotional indicators as well as
distortion of ‘injection feedback’ in addition to false entries added
manually by the attackers as a result of their inability to understand
what they are viewing or their malintent. There is no reliable way for
the attackers to determine what is true even if they try to apply their
observations to the aforementioned indicators. An attempt to prove
guilt with their system would be the equivalent to a cop dropping a gun
at a crime scene and claiming it belonged some individual who happened
to be passing by – RANDOM and FALSIFIED. There is no legal application
for this system or anything generated by it. They will only capture
what they want to abuse you with and when they decide to ‘censor’ your
thoughts they will force you into an abusive or incoherent thought
pattern using the injection and blocking methods mentioned above.

For example when you experience ‘sudden severe aggression and
agitation’ its the perps, not you. They injected those impulses.
Remember they want to keep you constantly thinking about them. You can
limit and counter this effect by learning to read memory while blocking
their system however it takes quite a bit of skill and self-awareness.
This is known as ‘Redirection’.

4. Redirection

Redirection is simple. When the remote neural attack happens and
impulses and thoughts are introduced into your mind (by strong urge
[high frequency attack] or slight motivation [low frequency attack])
just change your thread of thought. This hinders ‘integration
completion’ between your brain and the RNM system. The Bible says
“…whatever is true, whatever is noble, whatever is right, whatever is
pure, whatever is lovely, whatever is admirable–if anything is
excellent or praiseworthy–think about such things”. (Phillipians 4:8).

You can thwart their RNM attack by establishing a ‘working reference’
each time they attempt to inject impulses and thoughts to your brain.
This is done by recognizing something in life that makes you very happy
and then re focusing or ‘redirecting’ back to that happy experience in
life each time you are attacked through RNM.

If you can do this each day their attacks will simply be an annoyance
to you as you can work around it, but it will still hinder performance
tremendously as you will be forced to test and validate memory
constantly and the physical sensations of the system radiating your
brain will be both irritating and distracting. Note that these attacks
can be performed successfully at lower intensities and you will only
notice them if you are frequently being tested at higher intensities:
Torture!

Understanding the memory attacks (blocking your real memories and
injecting false memories and impulses) are key because if you do not
recognize modification of your ‘active memory’ the system will cause
you to briefly lose time perception which may be enough procedural
[functional] disorientation to influence you to respond to an injected
impulse. Forced speech for example.

It is possible for the system to influence you to speak unwillingly or,
at the very worst, without you knowing it. For example if you are
susceptible to the systems influences you may not realize that it is
frequently or constantly influencing you to make minor choices. These
motivational impulses can also be used to influence you in a manner
that will give you the desire to speak, and I emphasize desire because
you need to understand that these impulses will only make you feel the
urge [at higher levels set by the attackers] or basic motivation [at
baseline levels] to perform the tasks it is influencing you to do.

In combination with this motivation to speak the system uses past
references to direct you – for example you personal memory of turning
to speak to your wife and the associated impulse – and when you react
to this influence the system will block your working memory while
streaming the desired output which will result in you making one or
more statements under the system’s control. They will test this on you
frequently with ‘word substitution’ and if you can learn to control
this in thought then you can control it while speaking but you must
learn to multitask constantly!

If you do not have a ‘working reference’ to return to after the forced
speech attack it is possible that you will have no recollection of
making the statement.