CAHT Newsletter 1/15/17 How to Defeat Remote Neural Monitoring and Mind Control

Edmund Igberase, Targeted Individual
 
If you have a hard time understanding how remote neural monitoring (RNM) works, just think of how a lie detector works.  In theory RNM functions in similar manner to a lie detector: by measuring physiological responses emitted by the body.  In RNM, it is those physiological responses emitted via electromagnetic impulses by the brain.As you learn to defeat the predictive capabilities of the system — quenching, redirection, multi-tasking and spontaneity— their attempts to restrict your reference choices will become increasingly evident and you will begin to perceive what I will describe as ‘functional or focal duality’ within your working memory. The perps system’s prediction error rate will dramatically increase and its attempts to predict your thoughts or intentions will become humorous if not simply annoying.1. Multi-Tasking

Learn how to multi-task as multi tasking causes you to think in multiple threads.  When you are constantly thinking in multiple threads (multiple tasks or thoughts) then there is no coherent pattern for the perps to establish and integrate into RNM data.  In other words, ‘integration completion’ between the RNM system and your brain is hindered and without your response to that specific ‘impulse injection’, the RNM verification process is breaks apart.

The perps are using a  ‘fabricated or falsified stream’ to interfere with your memory and thought process.  Once you become dependent (ie. you believe their impulse injections are your own) on the system’s output (or they believe your responses to it are consistent) they will begin to fabricate ‘subconscious responses’ which they will pretend are indicators of honesty/dishonesty, positive recognition, anxiety, etc, and they will use ‘impulse injection’ to convince you that the fabricated responses are your own.

If you are unaware of this constant mental manipulation the system will begin to shape your thoughts and behavior. They will use this to [attempt to] restrict your thoughts and behavior by blocking [interfering with] your memory and thought process while these suggestions (injected impulses) are being provided – the interference is triggered and can be activated at will by the attackers.

2. Spontaneity

Never follow a set pattern of conduct.  Always change your behavior every day at a moments notice.  Do this when your quickly (not slowly) on the move as it is more difficult for their remote neural system to monitor your thoughts while your in rapid motion.

If you decide to go to the grocery store go to the convenience store instead.  Change it up everyday but don’t do the same things over and over as that establishes a pattern of conduct. Remember they are trying to alter your daily motives and emotional perceptions.

The remote neural monitoring system is designed to provoke you emotionally so they can generate response statistics which the system will use to determine how to interpret and link descriptions with data captured about your memory references.

Once they have consistent statistics the system will use previous ‘references’ and inject them into your subconscious thought during normal activity which is also referred to in ‘impulse injection’ to convince you that the response was your own and influence you to complete or describe the reference by making the appropriate verbalizing or performing a related action. You can fight and/or control this if you learn to defeat these memory attacks.

This same remote neural attack can be used to disrupt your speech if the attackers decide to prevent you from discussing a specific topic or repeating a given word. The system can be configured to disrupt your recollection when formulating a related statement or inject gibberish [triggered substitution] while you are attempting to speak.

The goals of these attacks appear to be Censorship, Memory Management, and Direct Behavior Control.  However these people are not concerned with legal constraints or any particularly acceptable way of life. They simply use anything you enjoy or appreciate to abuse you regardless of your behavior so if they give you a compliment, realize that they are only doing it to see how you will respond when they negate it and torture you nightly.

If you keep a constant handle on your ‘state of activity’ as well as your situational perception you will recognize conflicting impulses and although it is possible for the system to overpower your impulses, if you understand the attacks you will be able to recognize the physical changes resulting from these powerful impulses and this should prompt you to re-evaluate your current state.

Unless you have been tortured to near-incoherency you should be able to fight the system’s influences.  These remote neural attacks are most effective when you are stepping through sequenced tasks so try to avoid ‘zoning’ on your activities. How?  By changing your actions and activities randomly & constantly at the speed of thought.  Don’t always plan out or think out your daily itinerary, if you don’t have to.  ‘Just do it’ !

Remote neural manipulation is accomplished via their system’s ability to interpret your thoughts and is wholely dependant on its ability to predict and influence your ‘reference’ choices or impulse sequencing during thought composition. The system maps patterns with impulses and identifiers (evoked potentials) and uses statistical data about your ‘composition habits’ to predict how you will think or act as you begin to formulate thoughts or prepare to act. The system’s ability to define and map these references intelligibly depends on your cooperation [or ignorance] and the attackers’ ability to make sense of what they see visually or what they can guess based on your past activity.

3. Quenching

They will constantly run you through a ‘verification’ routine where the system probes you for a particular set of responses repeatedly in order to establish a pattern. If you are interacting and countering these probes the operator will vary the routine in an attempt to ‘verify’ via different methods.
Once the system ‘verifies’ the selected responses they will be used in the next wave of harassment routines – the process is endless and you will see the effects clearly if you are consistently defeating the system. If you are not defeating the remote neural system then you will not see or notice the effects. [Annotation: This suggests learning and feedback from the target, who is apparently a sort of “node” in artificial intelligence.]
The way to defeat their remote neural monitoring system is by ‘quenching’.

You ‘quench’ remote neural monitoring by interacting with and countering their tactics.
None of what these people are collecting could ever be used in a case against you. Every piece of information collected by their system can be considered falsified and/or fabricated because the system is designed to continuously provide ‘suggestions’ according to data which has been previously collected about your current activity and the accuracy of the reference descriptions [definitions] is extremely low since the attackers don’t really care about truth and the system will fabricate statements and/or imagery while they are abusing you. The fabrications are generally the result of misinterpretation of references and emotional indicators as well as distortion of ‘injection feedback’ in addition to false entries added manually by the attackers as a result of their inability to understand what they are viewing or their malintent. There is no reliable way for the attackers to determine what is true even if they try to apply their observations to the aforementioned indicators. An attempt to prove guilt with their system would be the equivalent to a cop dropping a gun at a crime scene and claiming it belonged some individual who happened to be passing by – RANDOM and FALSIFIED. There is no legal application for this system or anything generated by it. They will only capture what they want to abuse you with and when they decide to ‘censor’ your thoughts they will force you into an abusive or incoherent thought pattern using the injection and blocking methods mentioned above.

For example when you experience ‘sudden severe aggression and agitation’ its the perps, not you.  They injected those impulses.  Remember they want to keep you constantly thinking about them.
You can limit and counter this effect by learning to read memory while blocking their system however it takes quite a bit of skill and self-awareness.  This is known as ‘Redirection’.

4. Redirection

Redirection is simple.  When the remote neural attack happens and impulses and thoughts are introduced into your mind (by strong urge [high frequency attack] or slight motivation [low frequency attack]) just change your thread of thought.  This hinders ‘integration completion’  between your brain and the RNM system.  The Bible says “…whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable–if anything is excellent or praiseworthy–think about such things”. (Phillipians 4:8).

You can thwart their RNM attack by establishing a ‘working reference’ each time they attempt to inject impulses and thoughts to your brain.  This is done by recognizing something in life that makes you very happy and then re focusing or ‘redirecting’ back to that happy experience in life each time you are attacked through RNM.

If you can do this each day their attacks will simply be an annoyance to you as you can work around it, but it will still hinder performance tremendously as you will be forced to test and validate memory constantly and the physical sensations of the system radiating your brain will be both irritating and distracting.
Note that these attacks can be performed successfully at lower intensities and you will only notice them if you are frequently being tested at higher intensities: Torture!

Understanding the memory attacks (blocking your real memories and injecting false memories and impulses) are key because if you do not recognize modification of your ‘active memory’ the system will cause you to briefly lose time perception which may be enough procedural [functional] disorientation to influence you to respond to an injected impulse. Forced speech for example.

It is possible for the system to influence you to speak unwillingly or, at the very worst, without you knowing it. For example if you are susceptible to the systems influences you may not realize that it is frequently or constantly influencing you to make minor choices. These motivational impulses can also be used to influence you in a manner that will give you the desire to speak, and I emphasize desire because you need to understand that these impulses will only make you feel the urge [at higher levels set by the attackers] or basic motivation [at baseline levels] to perform the tasks it is influencing you to do.

In combination with this motivation to speak the system uses past references to direct you – for example you personal memory of turning to speak to your wife and the associated impulse – and when you react to this influence the system will block your working memory while streaming the desired output which will result in you making one or more statements under the system’s control. They will test this on you frequently with ‘word substitution’ and if you can learn to control this in thought then you can control it while speaking but you must learn to multitask constantly!

If you do not have a ‘working reference’ to return to after the forced speech attack it is possible that you will have no recollection of making the statement.

Share

15 thoughts on “CAHT Newsletter 1/15/17 How to Defeat Remote Neural Monitoring and Mind Control

  1. Refer to the instructions given. GSS does not take any responsibility for anything printed in the CAHT newsletter.

  2. I have recently been attacked with this. Unlike most people, I KNOW who my (main) attacker is. He was a fellow student in a class I had 8 years ago and infected our computer through a pic on a public social media account. He then hacked and controlled everything we owned including cars, phones, microwaves, etc. He was able to “tick” or “ping” things in our home, car, at school etc. and although I knew it was him, I had NO IDEA how he was doing it. Back then the things he could do seemed impossible and when I went to expert after expert, I was told that there was no way a person could hack into the “footprint” of a cable, electric or utility company. The implication was always that I was paranoid or crazy. Since he knew that I knew it was him he NEVER RELENTED in showing me he was ALWAYS WITH ME AND ABLE TO HAVE ACCESS TO ME EVERYWHERE. I basically gave up trying to get rid of him because he was evilly relentless and I’d already spent thousands of dollars with zero effect.

    Recently I decided to stop maintaining my silence about his abuse and started telling people in my classes who might be connected to my computer in some way that I had a hacker and if they wanted to know who he was, if they felt they’d been hacked, I’d be glad to write his name down for them but warned them that if they went anywhere near his stuff on line, they would be hacked far worse because once he knew they were aware of him, he wanted to keep their attention.

    Looking back I realize that last summer he was already increasing his abuse and had been targeting my ears making popping sounds. It didn’t hurt but it was obvious that it was being done deliberately. Some months later I noticed my pets were exhibiting extreme ear pain and they were constantly shaking their heads and couldn’t have them touched. I took them to the vet but there was no infection or fleas etc. (We spend a fortune on preventative meds to keep them healthy.) I then realized I had extreme pain in my ears. I’d gone away for the holidays and noticed a marked increase in the ear popping to the point that as soon as I woke up in the middle of the night to turn over, my ear immediately popped, like he was telling me he was right there with me and awake all the time. There was one night where I woke up and I didn’t feel/hear the pop and actually got out of bed to check the clock, thinking that this might be a time to do things if I ever needed to try to get a respite from him.

    I actually contacted his mother (I don’t know him personally at all, just what I could find on line) and told her that her son had been hacking our family for years and if she could at least ask him to stop. She was less than cordial but she didn’t seem a bit surprised that her middle-aged son was hacking innocent people.

    I then searched online trying to find out how he could create sound–several times a day he would tick our water bottles or the aluminum siding if we were outside etc.–and how he seemed to be able to track us in our home even though there were no cameras. ( I stopped carrying a phone years ago and am extremely aware that any speaker can be turned into a microphone and try to not say things when around these items if it’s not something I want him to hear.) I happened upon the Cuban diplomat situation where they had been attacked using sonic waves. I also found the University of Washington study that explained how sound waves can be used to track a person in their home.

    This terrorist has been doing all these things since he first hacked us 8 years ago. I had BEGGED him to stop many times over the years well aware that he could hear me and see what I was writing online. His answer was clearly displayed as NO.

    So now that it was confirmed that these many years what we were experiencing was not only REAL but SUPER EASY FOR A BORED HACKER TO CARRY OUT, and now he KNEW that I knew how “skilled” he was and it was clear he wanted me to be impressed/afraid. A few days later I woke up with a tingling in the back of my lower skull and the middle finger on my right hand was twitching. Backing up a bit, a few weeks prior to this I noticed that as I sat in my chair on my laptop, my body was heating up and there was a tingling feeling. This went on day after day as I was searching online trying to find out how he’d been able to hack us all these years when we replaced routers and computers etc. I had never really spent any time doing this and I’m guessing that he didn’t want me to know, lest I escape from him. The heating up also occurred at other times of the day and night and even in the car. I think he was trying to make me believe I was having hot flashes or going into menopause. I didn’t buy it and looked for a reason online.

    At the same time that I found the hacker stuff and realized he was using remote access Trojans sent via IP address or even remotely through wifi– was when this other stuff started. (After days of searching every nook and cranny of the many hacked computers we have, I discovered where there was a place for each user to sign in and one was the name of my computer and the other was “@host.” I looked this up online and sure enough, the Ghost remote access Trojan is one of the most insidious. He also “signaled” that I was correct in figuring this out. He’s proud of his evil you see.) The pelting with the sound waves happened and I was attacked all night long for several nights and was unable to sleep. He also did this during the day and evening the first few days. I went on line and discovered the sound wave thing and got the windshield reflector from the car and put it over myself and could hear what sounded like heavy raindrops as well as feel them. The night attacks with the tingling then occurred where I was unable to sleep for several nights.

    A few days ago I finally went to the police and then the FBI. On the way to the FBI the middle of my head started tingling and it felt like he was “uploading” and connecting that part of my brain. It made me that much more determined to get this abuser on record. The FBI people initially told me they would open a case but as I sat there waiting with my ears ringing, they came back and told me they wouldn’t. What changed their mind? I don’t know for sure but when I went home and looked this up for real, I discovered that the government PAYS private companies to carry this evil out on unaware victims. Maybe they looked his name up and realized he worked for them or maybe they didn’t want me to think they would help me. The woman said they had a file on him now and I stated again that he is a terrorist and if he can carry this out on truly innocent people, if he was angered enough, he could do it to a government system etc.

    The effects are obvious now. The weird hearing the obvious infiltration and the heartbreak that this evil man did this to me DELIBERATELY knowing there was no cure. This evil human being has essentially destroyed my entire life, after already destroying me for 8 years.

    So today I called the people I found on line that were associated with the address he has. I talked to the one woman and texted and left a message for another person. I am now going to leave and make a record and a history so that if this evil human does this to others they may be able to get help sooner as well as if I start having other problems, it can all be traced back to him.
    I’m going to make an appointment to have a record that I have the tingling in my head and tremors. Today he did the vibrations in my body, ops checking that all his evil is working as described.

    I was going to leave his name here as everything I’ve said is true and I want to oust him but I thought of his family members who would be affected and maybe harmed who have done nothing to contribute to his evil, and decided not to.

    Looking up and reading all the horrific abuse perpetuated on truly caring human beings by this evil trend is absolutely overwhelming. Each one of you deserves to be dearly and deeply loved and rewarded and I pray we are able to find a way to remove this from our heads someday. And I pray that each terrorist who perpetuates this evil on others pays heavily in eternity for every single thought, deed and action they carried out on others. God doesn’t forget as single thing we’ve gone through or a single evil thing they’ve done. Jesus told us plainly in John 8:44-45 what kind of people would never be accepted by him or forgiven due to their heart. 2 Tim 3:1-5 gives us a beautiful checklist that perfectly describes the kind of evil people we will be dealing with. (This “checklist” 100% describes/matches checklists for psychopaths).

    And to end this I want to bring up Corrie Ten Boom. If you don’t know who she was please look her up. She was a Dutch woman who during the second WW hid Jews in her home and helped in the underground rebellion. Her most famous book is The Hiding Place, and it was made into a movie as well. Any book written by her is FULL of the Holy Spirit and most of her books are small volumes available to purchase inexpensively and used. She and many of her family members were imprisoned during the war, and several died while being held prisoner. After the war while she was witnessing in Russia, she and her Christian friend were in their room and saw the many microphones placed in not-too-hidden places. She and her friend decided that they would take this opportunity to witness for Jesus and began talking in deliberate ways that testified to Him. They took the opportunity to spread the truth about Him, even though it may have seemed obvious and childish, and they knew they were being monitored.

    We are closer to and more deeply in the end times than Corrie was and many of the truths the bible was describing are more clear to us now. God has shown me that some of the reasons it will be so hard is because there are so many people who are born without a conscience (it appears to me that it is the majority of people over the entire world) and now that I’ve been thrust into this evil, I see again more clearly how very bad it will be. And it will get worse. I can plainly see that if God didn’t cut this time short (as is written in His word), no one would make it. That sound waves can kill a person if manipulated correctly, and there’s no way to monitor all the sound waves of the world. The internet guides evil-hearted humans in ways to steal, kill and destroy. John 10:10 tells us some people’s ONLY reason for living is to steal kill and destroy. ONLY REASON!

    So even though I’ve only been infected for a short time I am already lambasting him/these people with truth. Over and over I tell them that there’s not one single thing, thought or deed that will go unnoticed by God. I tell them that if any of them have a conscience they have now been forewarned that they are held responsible for these things being done and that if they chose to have no conscience they have chosen their own way but that God assures us and them that if they even give a cup of water to one of His children, they will be blessed. I am not shy about yelling at him/them, I sing horribly off-key, fart, make myself look hideous by making my chin extra double and pointing to all my unattractive features. If they thought they were gonna get a free peep show or a Christian who didn’t know the truth about evil and the truth about psychopaths, they have certainly learned the truth of it in the past few days.

    Our lives are our testimonies and we are to speak the truth of them without churching up the horror. The horror of the cross is never meant to be diminished or brushed aside because this real horror that Jesus chose to go through WAS HORRIBLE. What we are being forced to go through is HORRIBLE and here too we are MEANT to speak the truth of it. Evil IS real and comes in human form, and many people have chosen to be evil. It is not our job to fix them as there is technically nothing “wrong” with them, they have simply chosen their own ways and their souls delight in their abominations (Isaiah 66:3). Jesus showed us over and over by his dealings with people as written in the bible, that some people will never come to Him because they love what they are. God allowed these evil people to choose their own way, and he tells us that once they have proven they are evil, we are to accept them as He has, and have nothing to do with them. Paul too tells us to hand them over to Satan, and that they, like their father Satan will oppose and exalt themselves over everything that is called God or is worshiped…and this is the goal/dream/mindset of every human with the brain-functioning of a psychopath.

    Not one of you (us) is alone, but that doesn’t mean that it’s not horrific. Thank you for a place to put this.

  3. My name is Kenneth Cromeans. I am a victim of remote neural monitoring, actually the whole family is but i am the only one that sees what is going on. I dont know how long it has been going on but over a year ago, my wife of 25 years left me and i became homeless. I tried to find her, people kept saying they saw her and i kept hearing voices, now i know that they are in my head through RNM and i know there is a satellite and some kind of image thing that projects pic on pretty much anything. There is also neon purple clouds behind my eyelids, they float around and sometimes they are clear. Whoever is doing it is making me hullicnate all of the time and i don’t want it. The people inside my head always talking and i also know that i am hooked up to a computer that has been teaching me bible reverse psycology, purgatory learning type stuff. My wife is with someone else and both of them are not right, there has been several times that i have seen them in some kind of forced hallucination ,then blocked out right away. The people doing this are saying that they can control anyone that i talk to or call but i have to try. They out like this country does not care about their own people. They say that they are undectable but there is definitely a pinpoint satallite and more on me and others in the family. My wife would have never left me like she did and i was working and after i went homeless, no one came to check on me or anything, that would have never happened. I have evidence and alot of notes. I have coughed up a bunch of small black flakes and have burns on my arms from the satellite projector. I do know a whole lot more. They have been saying they are helping me but at the same time, they are the ones that did this and said they messed up and i know for a fact that they can see through my eyes and everyone elses.
    Thank you, my email is kctilerepair@gmail.com

  4. I have reason to believe this has been happening to me for a few months now. How I know is I have trust in myself and it only happens in my home in hawaii or around my cellphone when I travel. My ex boyfriend is navy and I have reason to believe it is being used to get banking information. Any info about this and how this is being done and if it can be done by cellphone would be helpful. Any info on how I can detect and stop it would be appreciated. I am a completely sane person but something is not right and I am scared
    I know he had some kind of thing that could detect thermos imaging through walls so if he could get that then how easily is this software attainable.

  5. TY for your HELP on this CONTROVERSIAL SUBJECT & in making others AWARE that this form of TORTURE does exsist & how it is being used on INNOCENT CIVILIANS. My son & have endured this torture going on 11 yrs. Everything you DESCRIBED above is EXACTLY what I’ve been going through & the torture never ends. I endure painful heard jerks accompanied with face movements & grunts when I try to keep myself occupied, as you stated above. What weird with this TECHNOLOGY is it mimics & tortures you with things you’ve experienced.

  6. The U.S. Attorney General of the Justice Department. It should be written in the form of an Affidavit and a cover letter should accompanied it.

  7. I have been subjected to this control for 18 years I know who it is can someone tell me who to report them to

  8. Thank you for this very helpful explanation of Remote Neural Electromagnetic Torture, which I have been subjected to for almost three years in Australia.

Leave a Reply

Your email address will not be published. Required fields are marked *