Remote Neural Monitoring – Advanced Brain Activity Tracking

Welcome to the World of Mind Control - Methods and Automatic System to Identify Who is Victims of Abuse Voice to Skull US20200275874A1

Methods and Automatic System to Identify Who is Victims of Abuse Voice to Skull & Remote Neural Monitoring Technology and Identify Who is Remote Attacker or Operator Using Device of Voice to Skull & Remote Neural Monitoring. US20200275874A1

EVIDENCE

About Mind Control and MK Ultra

Learn about the controversial MK Ultra program and its implications in modern psychological manipulation.

Learn More

Who Are Targeted Individuals?

Understand the experiences and challenges faced by those who claim to be victims of targeted surveillance and control.

Read Stories

The Science Behind Mind Reading

Delve into the technology and research on mind reading and its potential applications.
Thought transmission unit sends modulated electromagnetic wave beams to human receiver to influence thoughts and actions without electronic receiver

Explore Science

Methods and Automatic System to Identify Victims of Abuse Using Voice to Skull & Remote Neural Monitoring Technology

A method to identify victims of abuse and remote operators using Voice to Skull and Remote Neural Monitoring technology involves several key steps. The process utilizes a database in a computer that includes various categories such as disgusting items, funny items, anti-political trend and anti-religious belief items, countries and races, foreign clubs or organizations, languages and dialects, and scientific knowledge. The goal is to identify who is being targeted by remote operators using these technologies.

The tested person is instructed to select an item that only causes a psychological response in the remote operator, but not in the tested individual. This allows the identification of the remote operator’s reaction. Subsequently, the individual is asked to launch an imaginary psychological attack, and test questions are assigned based on this fictional attack.

The responses from the tested individual are then analyzed using a polygraph meter to determine the truthfulness of the answers, thus helping identify whether the person is a victim of abuse or if the remote operator is involved. This innovative method offers a potential approach to identifying both the victims and perpetrators of this controversial technology.

Explore Videos