Αγορά Πολιτών

Τρόπος Συμμετοχής

Χορηγίες

Πολίτες στην Αγορά

Έχουμε 1238 επισκέπτες συνδεδεμένους

Επικοινωνία

Γερμανία 004917667046073

The Absolute Evil

 

Gang-stalking Greeks

 

Byzantine Atrocities

 

European Dissidents ALARM

 

Human Rights' Court

 

The used up men

 

Dissidents - USG RICO crimes

 

Open Letter to Theresa May

 

Open Letter to António Guterres UN's SG

 

Triangulation - Zersetzen

 

Open Letter to Andrew Parker, MI5

  

Πράξεις ποταπές - Despicable choices

 

 

My father's death

 

Cavitation damage

 

Burglary and vandalism

 

Dry mini submarine

 

Message to Bundeswehr 2

 

Message to Bundeswehr 1

 

“Tough” guys and TOUGH guys

 

Μοναδική λύση, το Χόλιγουντ

 

Charlatans

 

Zeppelin: Beyond Gravity

 

Foreign intervention in Greece?

 

Η ανελεύθερη Ελλάδα

 

Η Ελλάδα καταγώγιο;

 

Αν.Επ. Π. Παυλόπουλο

  

Intangible prisons

 

Plausible deniability

 

Images of German w & s

 

Crimes against Humanity

 

"Chimera" - "Bellerophon"

 

pr. Donald Trump

 

  

Legal Notice 87

 

Βδέλλες, αποικιοκρατικές

 

Being a German

 

Legal Notice 84

 

Dirty colonial methods

 

Georgi Markov, BG - KGB

 

Samples of Barbarity

 

Ελλάδα - αποκόλληση

 

Έλληνες, στο έλεος...

 

Harvester's log 16/3/17

 

 

Legal Notice 66

 

Execrable

 

Legal Notice 62

 

  

My story

 

  

Aggression?

 

  

Η Εστία μου

 

  

Why so untidy?

 

  

Αποικιοκρατία

 

  

Εξόντωση Ελλήνων αντιφρονούντων;

 

  

Ζήτημα εμπιστοσύνης

 

  

Μεθοδικότητα

 

  

Ανοικτή Επιστολή πρέσβη ΗΠΑ

Αφορμή, U2RIT vs Ελλάδα;

Βιοηθική

A request to U2RIT

Colonial aggression - 2

Open Letter to UN S.G.

Open Letter to p.C. & p. O.

Δήλωση πρόθεσης επαναπατρισμού

 

Ο "εφιάλτης" της Νυρεμβέργης

Συλλογή Φωτογραφιών

Αίτημα προστασίας, προς Ιταλία

Chroma key, background removal

Science and Ethics

Να συμβάλει και η U2RIT

Θα ξαναφτιάξουν πολλές φορές Άουσβιτς και Zyclon B

 

Split-Screen effect

Η Ζωή είναι Ωραία.

Βόρεια Κορέα

Λευτεριά στους Έλληνες, εξανα- γκαστικά "Εξαφανισμένους"

 

Μυστικές δίκες;

Trustworthiness

Πολιτισμό, ή, απληστία;

Ακραία Στυγνότητα

Η Τέχνη της Επιβίωσης

Political Asylum 3

Επιστροφή στις ρίζες

The Human Cost of Torture

An urgent appeal for solidarity

More obvious than the Sun

Western "culture"

Political Asylum

Έννομη Προστασία

Μια μήνυση που εγείρει ερωτηματικά

 

 

 

Honor your father...

Noise

Creative Greeks

A pair of Dictatorships

How to Defeat Remote Neural Monitoring and Mind Control PDF Εκτύπωση E-mail
Αξιολόγηση Χρήστη: / 0
ΧείριστοΆριστο 
Συνεννόηση για Δράση - Απόψεις
Συντάχθηκε απο τον/την Χρήστος Μπούμπουλης (Christos Boumpoulis)   
Τρίτη, 25 Σεπτέμβριος 2018 22:35
Edward Snowden describing Remote Neural Monitoring

www.youtube.com/watch?v= YKnVcjXfJs4

How to Defeat Remote Neural Monitoring and Mind Control


If you have a hard time understanding how remote neural monitoring (RNM) works, just think of how a lie detector works.  In theory RNM functions in similar manner to a lie detector: by measuring physiological responses emitted by the body.  In RNM, it is those physiological responses emitted via electromagnetic impulses by the brain.As you learn to defeat the predictive capabilities of the system — quenching, redirection, multi-tasking and spontaneity— their attempts to restrict your reference choices will become increasingly evident and you will begin to perceive what I will describe as ‘functional or focal duality’ within your working memory. The perps system’s prediction error rate will dramatically increase and its attempts to predict your thoughts or intentions will become humorous if not simply annoying.1. Multi-Tasking
Learn how to multi-task as multi tasking causes you to think in multiple threads.  When you are constantly thinking in multiple threads (multiple tasks or thoughts) then there is no coherent pattern for the perps to establish and integrate into RNM data. In other words, ‘integration completion’ between the RNM system and your brain is hindered and without your response to that specific ‘impulse injection’, the RNM verification process is breaks apart.
The perps are using a  ‘fabricated or falsified stream’ to interfere with your memory and thought process.  Once you become dependent (ie. you believe their impulse injections are your own) on the system’s output (or they believe your responses to it are consistent) they will begin to fabricate ‘subconscious responses’ which they will pretend are indicators of honesty/dishonesty, positive recognition, anxiety, etc, and they will use ‘impulse injection’ to convince you that the fabricated responses are your own.
If you are unaware of this constant mental manipulation the system will begin to shape your thoughts and behavior. They will use this to [attempt to] restrict your thoughts and behavior by blocking [interfering with] your memory and thought process while these suggestions (injected impulses) are being provided – the interference is triggered and can be activated at will by the attackers.

2. Spontaneity
Never follow a set pattern of conduct.  Always change your behavior every day at a moments notice.  Do this when your quickly (not slowly) on the move as it is more difficult for their remote neural system to monitor your thoughts while your in rapid motion.
If you decide to go to the grocery store go to the convenience store instead.  Change it up everyday but don’t do the same things over and over as that establishes a pattern of conduct. Remember they are trying to alter your daily motives and emotional perceptions.
The remote neural monitoring system is designed to provoke you emotionally so they can generate response statistics which the system will use to determine how to interpret and link descriptions with data captured about your memory references.
Once they have consistent statistics the system will use previous ‘references’ and inject them into your subconscious thought during normal activity which is also referred to in ‘impulse injection’ to convince you that the response was your own and influence you to complete or describe the reference by making the appropriate verbalizing or performing a related action. You can fight and/or control this if you learn to defeat these memory attacks.
This same remote neural attack can be used to disrupt your speech if the attackers decide to prevent you from discussing a specific topic or repeating a given word. The system can be configured to disrupt your recollection when formulating a related statement or inject gibberish [triggered substitution] while you are attempting to speak.
The goals of these attacks appear to be Censorship, Memory Management, and Direct Behavior Control.  However these people are not concerned with legal constraints or any particularly acceptable way of life. They simply use anything you enjoy or appreciate to abuse you regardless of your behavior so if they give you a compliment, realize that they are only doing it to see how you will respond when they negate it and torture you nightly.
If you keep a constant handle on your ‘state of activity’ as well as your situational perception you will recognize conflicting impulses and although it is possible for the system to overpower your impulses, if you understand the attacks you will be able to recognize the physical changes resulting from these powerful impulses and this should prompt you to re-evaluate your current state.
Unless you have been tortured to near-incoherency you should be able to fight the system’s influences.  These remote neural attacks are most effective when you are stepping through sequenced tasks so try to avoid ‘zoning’ on your activities. How? By changing your actions and activities randomly & constantly at the speed of thought.  Don’t always plan out or think out your daily itinerary, if you don’t have to.  ‘Just do it’ !
Remote neural manipulation is accomplished via their system’s ability to interpret your thoughts and is wholely dependant on its ability to predict and influence your ‘reference’ choices or impulse sequencing during thought composition. The system maps patterns with impulses and identifiers (evoked potentials) and uses statistical data about your ‘composition habits’ to predict how you will think or act as you begin to formulate thoughts or prepare to act. The system’s ability to define and map these references intelligibly depends on your cooperation [or ignorance] and the attackers’ ability to make sense of what they see visually or what they can guess based on your past activity.

3. Quenching
They will constantly run you through a ‘verification’ routine where the system probes you for a particular set of responses repeatedly in order to establish a pattern. If you are interacting and countering these probes the operator will vary the routine in an attempt to ‘verify’ via different methods.
Once the system ‘verifies’ the selected responses they will be used in the next wave of harassment routines – the process is endless and you will see the effects clearly if you are consistently defeating the system. If you are not defeating the remote neural system then you will not see or notice the effects. [Annotation: This suggests learning and feedback from the target, who is apparently a sort of “node” in artificial intelligence.]
The way to defeat their remote neural monitoring system is by ‘quenching’.
You ‘quench’ remote neural monitoring by interacting with and countering their tactics.
None of what these people are collecting could ever be used in a case against you. Every piece of information collected by their system can be considered falsified and/or fabricated because the system is designed to continuously provide ‘suggestions’ according to data which has been previously collected about your current activity and the accuracy of the reference descriptions [definitions] is extremely low since the attackers don’t really care about truth and the system will fabricate statements and/or imagery while they are abusing you. The fabrications are generally the result of misinterpretation of references and emotional indicators as well as distortion of ‘injection feedback’ in addition to false entries added manually by the attackers as a result of their inability to understand what they are viewing or their malintent. There is no reliable way for the attackers to determine what is true even if they try to apply their observations to the aforementioned indicators. An attempt to prove guilt with their system would be the equivalent to a cop dropping a gun at a crime scene and claiming it belonged some individual who happened to be passing by – RANDOM and FALSIFIED. There is no legal application for this system or anything generated by it. They will only capture what they want to abuse you with and when they decide to ‘censor’ your thoughts they will force you into an abusive or incoherent thought pattern using the injection and blocking methods mentioned above.
For example when you experience ‘sudden severe aggression and agitation’ its the perps, not you.  They injected those impulses.  Remember they want to keep you constantly thinking about them.
You can limit and counter this effect by learning to read memory while blocking their system however it takes quite a bit of skill and self-awareness.  This is known as ‘Redirection’.

4. Redirection
Redirection is simple.  When the remote neural attack happens and impulses and thoughts are introduced into your mind (by strong urge [high frequency attack] or slight motivation [low frequency attack]) just change your thread of thought.  This hinders ‘integration completion’  between your brain and the RNM system.  The Bible says “…whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable–if anything is excellent or praiseworthy–think about such things”. (Phillipians 4:8).
You can thwart their RNM attack by establishing a ‘working reference’ each time they attempt to inject impulses and thoughts to your brain.  This is done by recognizing something in life that makes you very happy and then re focusing or ‘redirecting’ back to that happy experience in life each time you are attacked through RNM.
If you can do this each day their attacks will simply be an annoyance to you as you can work around it, but it will still hinder performance tremendously as you will be forced to test and validate memory constantly and the physical sensations of the system radiating your brain will be both irritating and distracting.
Note that these attacks can be performed successfully at lower intensities and you will only notice them if you are frequently being tested at higher intensities: Torture!
Understanding the memory attacks (blocking your real memories and injecting false memories and impulses) are key because if you do not recognize modification of your ‘active memory’ the system will cause you to briefly lose time perception which may be enough procedural [functional] disorientation to influence you to respond to an injected impulse. Forced speech for example.
It is possible for the system to influence you to speak unwillingly or, at the very worst, without you knowing it. For example if you are susceptible to the systems influences you may not realize that it is frequently or constantly influencing you to make minor choices. These motivational impulses can also be used to influence you in a manner that will give you the desire to speak, and I emphasize desire because you need to understand that these impulses will only make you feel the urge [at higher levels set by the attackers] or basic motivation [at baseline levels] to perform the tasks it is influencing you to do.
In combination with this motivation to speak the system uses past references to direct you – for example you personal memory of turning to speak to your wife and the associated impulse – and when you react to this influence the system will block your working memory while streaming the desired output which will result in you making one or more statements under the system’s control. They will test this on you frequently with ‘word substitution’ and if you can learn to control this in thought then you can control it while speaking but you must learn to multitask constantly!
If you do not have a ‘working reference’ to return to after the forced speech attack it is possible that you will have no recollection of making the statement.
Source: http://govsponsoredstalking.info/?p=3036

Note: I wish that, both, the German Armed Forces' members as well as, the Swedish Armed Forces' members, would become informed about the content of this present article. Christos Boumpoulis .