Advertisement

Targeted Individual Bryan Tew: Four methods to shield oneself from MIND CONTROL TECHNOLOGIES

Targeted Individual Bryan Tew: Four methods to shield oneself from MIND CONTROL TECHNOLOGIES FOUR METHODS OF SHIELDING FROM CIA/DIA TRAUMA-BASED MIND CONTROL TECHNOLOGIES
1. PASSIVE SHIELDING
2. CHEMICAL SHIELDING
3. MENTAL SHIELDING
4. ELECTRONIC JAMMING

The remote neural monitoring system is designed to provoke you emotionally so they can generate response statistics which the system will use to determine how to interpret and link descriptions with data captured about your memory references. That is why they are constantly trying to keep you talking, or constantly stopping you and asking for directions, etc.

So always ignore prolonged random encounters with people you don't know. You're not being rude. Just refusing to allow them to manipulate you.

Once they have consistent statistics the system will use previous 'choice references' and inject them into your subconscious thought during normal activity which is also referred to as 'impulse injections' to convince you that the response was your own and influence you to complete or describe the reference by making the appropriate verbalizing or performing a related action, which is known as 'Verification'. You can fight and/or control this if you learn to defeat these memory attacks by learning to read active memory.

Once they see what you respond to emotionally, or intellectually, they will fabricate 'conversational' or 'situational' scenarios (Street Theater) based on events or topics they know will capture your attention.

The purpose of the RNM system influencing you using a DEADLY GAME of remote neural Deception and Manipulation is to give the attackers (Hive Mind Teams (Cognitive Researchers) and the Brain to Computer Interface (Conscious Supercomputer) the ability to restrict you at will and to allow them to deceive or manipulate you subconsciously.

VOICE TO SKULL (V2K) OPERATES IN SAME MANNER:

Everyone who is hearing "V2K" is being monitored in this manner and being influenced in this way as well. The phrases you are hearing should be related to information captured during the 'Silent Monitoring Period' and will eventually be used as the foundation for your endless verbal harassment.

You can only counter these restrictions if you are able to contrast the system's influence from your own willful activity. This is called READING ACTIVE MEMORY and involves looking for compulsive and obsessive patterns of irrational thought and erratic behavior in your own life.

ACTIVE MEMORY means testing and validating the victims short term memory (anything less than thirty seconds) as the victim begins to formulate his thoughts, preparing to act.

Seeing the relationship between your memory references and the systems output [which can be a specific directed energy attack, an audible forced speech sequence, etc., is critical to understanding how to control and ultimately defeat 'thought-triggered' attacks in addition to preventing the attackers from deceiving you with their cognitive magic tricks.

They can impose false memories by using a ‘fabricated falsified stream’ to inject memories into your subconscious which you will believe are real but are not. One way this is achieved is by way of ‘Dream Modulation’. These memories implanted in your mind can be good. or terribly bad and can be so powerful that even though you are told they are not real you will not believe it. No matter what, with repetitive reinforcement you will come to believe the memories are your own unless you learn how to read active memory.

The RNM Supercomputer interfaces (integration completion via a Brain to Computer Interface) with the human mind and begins to inject imagery and other visual and verbal sequences into the human mind that the TI does not recognize seeking to establish integration completion between the rnm system and the human mind.

Using MEMORY MANAGEMENT and repetitive reinforcement (Neuroprogramming: Beta-Programming, etc.) they can make a woman believe that she was raped and sexually molested as child by her father. People will tell her that it never happened but with Repetitive Reinforcement Neuroprogramming she will come to believe that it did. This is an example of REPETITIVE REINFORCEMENT and only when the victim begins to learn how to READ ACTIVE MEMORY can she determine what is truth from deception.
IF you keep a constant handle on your 'State of Activity' as well as your situational perception you will recognize conflicting impulses and although it is possible for the system to overpower your impulses, if you understand the attacks you will be able to recognize the physical changes resulting from these powerful impulses and this should prompt you to re-evaluate your current state.

THE SAME DIRECTED ENERGY ATTACKS THAT HAPPENED TO THE AMERICAN EMBASSY EMPLOYEES IN HAVANA CUBA IS HAPPENING TO ME BUT PEOPLE BELIEVE THEM BUT DOUBT ME. I WAS IN HAVANA CUBA BEFORE THE EMBASSY WAS THERE AND I WAS BRUTALLY ATTACKED AND TORTURED WITH THIS TECHNOLOGY

I also possess medical evidence to prove the attacks are happening in the form of YouTube

TECHNOLOGIES

Post a Comment

0 Comments