We use cookie to save e.g your langauge settings. We don't need any informations about You. We dont collect any information about You. '
Methods and Automatic System to Identify Who is Victims of Abuse Voice to Skull & Remote Neural Monitoring Technology and Identify Who is Remote Attacker or Operator Using Device of Voice to Skull & Remote Neural Monitoring. US20200275874A1
Learn about the controversial MK Ultra program and its implications in modern psychological manipulation.
Understand the experiences and challenges faced by those who claim to be victims of targeted surveillance and control.
Delve into the technology and research on mind reading and its potential applications.Thought transmission unit sends modulated electromagnetic wave beams to human receiver to influence thoughts and actions without electronic receiver
Methods and Automatic System to Identify Victims of Abuse Using Voice to Skull & Remote Neural Monitoring Technology
A method to identify victims of abuse and remote operators using Voice to Skull and Remote Neural Monitoring technology involves several key steps. The process utilizes a database in a computer that includes various categories such as disgusting items, funny items, anti-political trend and anti-religious belief items, countries and races, foreign clubs or organizations, languages and dialects, and scientific knowledge. The goal is to identify who is being targeted by remote operators using these technologies.
The tested person is instructed to select an item that only causes a psychological response in the remote operator, but not in the tested individual. This allows the identification of the remote operator’s reaction. Subsequently, the individual is asked to launch an imaginary psychological attack, and test questions are assigned based on this fictional attack.
The responses from the tested individual are then analyzed using a polygraph meter to determine the truthfulness of the answers, thus helping identify whether the person is a victim of abuse or if the remote operator is involved. This innovative method offers a potential approach to identifying both the victims and perpetrators of this controversial technology.