{"id":3036,"date":"2017-01-17T19:21:41","date_gmt":"2017-01-18T00:21:41","guid":{"rendered":"http:\/\/govsponsoredstalking.info\/?p=3036"},"modified":"2017-01-17T19:21:41","modified_gmt":"2017-01-18T00:21:41","slug":"caht-newsletter-11517-how-to-defeat-remote-neural-monitoring-and-mind-control","status":"publish","type":"post","link":"https:\/\/govsponsoredstalking.info\/?p=3036","title":{"rendered":"CAHT Newsletter 1\/15\/17 How to Defeat Remote Neural Monitoring and Mind Control"},"content":{"rendered":"<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9138\">Edmund Igberase, Targeted Individual<\/span><br \/>\n<span id=\"yui_3_16_0_ym19_1_1484691334051_9234\">\u00a0<\/span><br \/>\n<span id=\"yui_3_16_0_ym19_1_1484691334051_9096\">If you have a hard time understanding how remote neural monitoring (RNM) works, just think of how a lie detector works.\u00a0 In theory RNM functions in similar manner to a lie detector: by measuring physiological responses emitted by the body.\u00a0 In RNM, it is those physiological responses emitted via electromagnetic impulses by the brain.<\/span><span id=\"yui_3_16_0_ym19_1_1484691334051_9101\">As you learn to defeat the predictive capabilities of the system &#8212; <b>quenching, redirection, multi-tasking and spontaneity<\/b>&#8212; their attempts to restrict your reference choices will become increasingly evident and you will begin to perceive what I will describe as &#8216;functional or focal duality&#8217; within your working memory. The perps system&#8217;s prediction error rate will dramatically increase and its attempts to predict your thoughts or intentions will become humorous if not simply annoying.<\/span>1. Multi-Tasking<\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9161\"><b id=\"yui_3_16_0_ym19_1_1484691334051_9160\">Learn how to multi-task as multi tasking causes you to think in multiple threads.\u00a0 When you are constantly thinking in multiple threads (multiple tasks or thoughts) then there is no coherent pattern for the perps to establish and integrate into RNM data.\u00a0 In other words, &#8216;integration completion&#8217; between the RNM system and your brain is hindered and without your response to that specific &#8216;impulse injection&#8217;, the RNM verification process is breaks apart.<\/b><\/span><\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9162\">The perps are using a\u00a0 &#8216;fabricated or falsified stream&#8217; to interfere with your memory and thought process.\u00a0 Once you become dependent (ie. you believe their impulse injections are your own) on the system&#8217;s output (or they believe your responses to it are consistent) they will begin to fabricate &#8216;subconscious responses&#8217; which they will pretend are indicators of honesty\/dishonesty, positive recognition, anxiety, etc, and they will use &#8216;impulse injection&#8217; to convince you that the fabricated responses are your own.<\/span><\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9163\">If you are unaware of this constant mental manipulation the system will begin to shape your thoughts and behavior. They will use this to [attempt to] restrict your thoughts and behavior by blocking [interfering with] your memory and thought process while these suggestions (injected impulses) are being provided &#8211; the interference is triggered and can be activated at will by the attackers.<\/span><\/p>\n<p>2. Spontaneity<\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9222\">Never follow a set pattern of conduct.\u00a0 Always change your behavior every day at a moments notice.\u00a0 Do this when your quickly (not slowly) on the move as it is more difficult for their remote neural system to monitor your thoughts while your in rapid motion.<\/span><\/p>\n<p>If you decide to go to the grocery store go to the convenience store instead.\u00a0 Change it up everyday but don&#8217;t do the same things over and over as that establishes a pattern of conduct. Remember they are trying to alter your daily motives and emotional perceptions.<\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9164\">The remote neural monitoring system is designed to provoke you emotionally so they can generate response statistics which the system will use to determine how to interpret and link descriptions with data captured about your memory references.<br \/>\n<\/span><\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9221\">Once they have consistent statistics the system will use previous &#8216;references&#8217; and inject them into your subconscious thought during normal activity which is also referred to in &#8216;impulse injection&#8217; to convince you that the response was your own and influence you to complete or describe the reference by making the appropriate verbalizing or performing a related action. You can fight and\/or control this if you learn to defeat these memory attacks.<\/span><\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9220\">This same remote neural attack can be used to disrupt your speech if the attackers decide to prevent you from discussing a specific topic or repeating a given word. The system can be configured to disrupt your recollection when formulating a related statement or inject gibberish [triggered substitution] while you are attempting to speak.<\/span><\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9219\"><b id=\"yui_3_16_0_ym19_1_1484691334051_9218\">The goals of these attacks appear to be Censorship, Memory Management, and Direct Behavior Control<\/b>.\u00a0 However these people are not concerned with legal constraints or any particularly acceptable way of life. They simply use anything you enjoy or appreciate to abuse you regardless of your behavior so if they give you a compliment, realize that they are only doing it to see how you will respond when they negate it and torture you nightly.<\/span><\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9165\">If you keep a constant handle on your &#8216;state of activity&#8217; as well as your situational perception you will recognize conflicting impulses and although it is possible for the system to overpower your impulses, if you understand the attacks you will be able to recognize the physical changes resulting from these powerful impulses and this should prompt you to re-evaluate your current state.<\/span><\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9166\"><b id=\"yui_3_16_0_ym19_1_1484691334051_9217\">Unless you have been tortured to near-incoherency you should be able to fight the system&#8217;s influences.\u00a0 <\/b>These remote neural attacks are most effective when you are stepping through sequenced tasks so try to avoid &#8216;zoning&#8217; on your activities. How?\u00a0 By changing your actions and activities randomly &amp; constantly at the speed of thought.\u00a0 Don&#8217;t always plan out or think out your daily itinerary, if you don&#8217;t have to.\u00a0 &#8216;Just do it&#8217; !<\/span><\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9216\"><span id=\"yui_3_16_0_ym19_1_1484691334051_9215\">Remote neural manipulation is accomplished via their system&#8217;s ability to interpret your thoughts and is wholely dependant on its ability to predict and influence your &#8216;reference&#8217; choices or impulse sequencing during thought composition. The system maps patterns with impulses and identifiers (evoked potentials) and uses statistical data about your &#8216;composition habits&#8217; to predict how you will think or act as you begin to formulate thoughts or prepare to act. The system&#8217;s ability to define and map these references intelligibly depends on your cooperation [or ignorance] and the attackers&#8217; ability to make sense of what they see visually or what they can guess based on your past activity.<\/span><\/span><\/p>\n<p>3. Quenching<\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9214\"><b id=\"yui_3_16_0_ym19_1_1484691334051_9213\">They will constantly run you through a &#8216;verification&#8217; routine where the system probes you for a particular set of responses repeatedly in order to establish a pattern. If you are interacting and countering these probes the operator will vary the routine in an attempt to &#8216;verify&#8217; via different methods.<\/b><\/span><br \/>\n<span id=\"yui_3_16_0_ym19_1_1484691334051_9167\">Once the system &#8216;verifies&#8217; the selected responses they will be used in the next wave of harassment routines &#8211; the process is endless and you will see the effects clearly if you are consistently defeating the system. If you are not defeating the remote neural system then you will not see or notice the effects. [Annotation: This suggests learning and feedback from the target, who is apparently a sort of &#8220;node&#8221; in artificial intelligence.]<\/span><br \/>\nThe way to defeat their remote neural monitoring system is by &#8216;quenching&#8217;.<\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9212\"><b id=\"yui_3_16_0_ym19_1_1484691334051_9211\">You &#8216;quench&#8217; remote neural monitoring by interacting with and countering their tactics. <\/b><\/span><br \/>\n<span id=\"yui_3_16_0_ym19_1_1484691334051_9171\"><b>None of what these people are collecting could ever be used in a case against you<\/b>. Every piece of information collected by their system can be considered falsified and\/or fabricated because the system is designed to continuously provide &#8216;suggestions&#8217; according to data which has been previously collected about your current activity and the accuracy of the reference descriptions [definitions] is extremely low since the attackers don&#8217;t really care about truth and the system will fabricate statements and\/or imagery while they are abusing you. The fabrications are generally the result of misinterpretation of references and emotional indicators as well as distortion of &#8216;injection feedback&#8217; in addition to false entries added manually by the attackers as a result of their inability to understand what they are viewing or their malintent. There is no reliable way for the attackers to determine what is true even if they try to apply their observations to the aforementioned indicators. An attempt to prove guilt with their system would be the equivalent to a cop dropping a gun at a crime scene and claiming it belonged some individual who happened to be passing by &#8211; RANDOM and FALSIFIED. There is no legal application for this system or anything generated by it. They will only capture what they want to abuse you with and when they decide to &#8216;censor&#8217; your thoughts they will force you into an abusive or incoherent thought pattern using the injection and blocking methods mentioned above.<\/span><\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9173\"><b id=\"yui_3_16_0_ym19_1_1484691334051_9172\">For example when you experience &#8216;sudden severe aggression and agitation&#8217; its the perps, not you.\u00a0 They injected those impulses.\u00a0 Remember they want to keep you constantly thinking about them<\/b>.<\/span><br \/>\n<span id=\"yui_3_16_0_ym19_1_1484691334051_9206\">You can limit and counter this effect by learning to read memory while blocking their system however it takes quite a bit of skill and self-awareness.\u00a0 This is known as &#8216;Redirection&#8217;.<\/span><\/p>\n<p>4. Redirection<\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9175\"><b id=\"yui_3_16_0_ym19_1_1484691334051_9174\">Redirection is simple.\u00a0 When the remote neural attack happens and impulses and thoughts are introduced into your mind (by strong urge [high frequency attack] or slight motivation [low frequency attack]) just change your thread of thought.\u00a0 This hinders &#8216;integration completion&#8217;\u00a0 between your brain and the RNM system<\/b>.\u00a0 The Bible says &#8220;&#8230;whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable&#8211;if anything is excellent or praiseworthy&#8211;think about such things&#8221;. (Phillipians 4:8). <\/span><\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9177\">You can thwart their RNM attack by establishing a &#8216;working reference&#8217; each time they attempt to inject impulses and thoughts to your brain.\u00a0 This is done by recognizing something in life that makes you very happy and then re focusing or &#8216;redirecting&#8217; back to that happy experience in life each time you are attacked through RNM.<\/span><\/p>\n<p>If you can do this each day their attacks will simply be an annoyance to you as you can work around it, but it will still hinder performance tremendously as you will be forced to test and validate memory constantly and the physical sensations of the system radiating your brain will be both irritating and distracting.<br \/>\n<span id=\"yui_3_16_0_ym19_1_1484691334051_9205\">Note that these attacks can be performed successfully at lower intensities and you will only notice them if you are frequently being tested at higher intensities: Torture!<\/span><\/p>\n<p>Understanding the memory attacks (blocking your real memories and injecting false memories and impulses) are key because if you do not recognize modification of your &#8216;active memory&#8217; the system will cause you to briefly lose time perception which may be enough procedural [functional] disorientation to influence you to respond to an injected impulse. Forced speech for example.<\/p>\n<p><b>It is possible for the system to influence you to speak unwillingly or, at the very worst, without you knowing it. For example if you are susceptible to the systems influences you may not realize that it is frequently or constantly influencing you to make minor choices. These motivational impulses can also be used to influence you in a manner that will give you the desire to speak, and I emphasize desire because you need to understand that these impulses will only make you feel the urge [at higher levels set by the attackers] or basic motivation [at baseline levels] to perform the tasks it is influencing you to do.<\/b><\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9204\">In combination with this motivation to speak the system uses past references to direct you &#8211; for example you personal memory of turning to speak to your wife and the associated impulse &#8211; and when you react to this influence the system will block your working memory while streaming the desired output which will result in you making one or more statements under the system&#8217;s control. They will test this on you frequently with &#8216;word substitution&#8217; and if you can learn to control this in thought then you can control it while speaking but you must learn to multitask constantly!<\/span><\/p>\n<p><span id=\"yui_3_16_0_ym19_1_1484691334051_9203\">If you do not have a &#8216;working reference&#8217; to return to after the forced speech attack it is possible that you will have no recollection of making the statement.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Edmund Igberase, Targeted Individual \u00a0 If you have a hard time understanding how remote neural monitoring (RNM) works, just think of how a lie detector works.\u00a0 In theory RNM functions in similar manner to a lie detector: by measuring physiological &hellip; <a href=\"https:\/\/govsponsoredstalking.info\/?p=3036\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3036","post","type-post","status-publish","format-standard","hentry","category-detailing-cimes-against-humanity"],"_links":{"self":[{"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/posts\/3036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3036"}],"version-history":[{"count":1,"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/posts\/3036\/revisions"}],"predecessor-version":[{"id":3037,"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/posts\/3036\/revisions\/3037"}],"wp:attachment":[{"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}