As i was searching the internet looking for more information on these attacks i stumbled upon a comment from a kind soul who gave us all very useful information which is being re-posted here. I suggest you study the following information as it may help you look past their "Illusions" or "BS". I hope this helps you fight these attacks and build an inmune system to them.
(This information was gathered on the internet and i do not own rights to it)
I'm reposting this here because I believe it will be useful to anyone who is experiencing these attacks. Yes they are attempting to read your thoughts and you can limit both their ability to manipulate you as well as their system's ability to translate your thoughts if you're fully aware of its influence on you. Note that none of this is speculative. By possibility I simply mean that those reading may or not have experienced a specific method of attack but there appears to be common intent and centralization.
At this point everyone should see that I'm pressing for targets who are experiencing audible harassment and/or directed energy attacks to pay attention to what I've described as an integrated system which is being used to monitor our thoughts and behavior, then use the collected data to trigger attacks which will allow these terrorists to directly manipulate our behavior, injure us, impede or induce biological function, or flood us with abusive input resulting in daily psychological torture.
I would like to bring to your attention the possibility that your daily motives and emotional perceptions are being altered by this 'system.' As I mentioned in previous posts these people will pretend to be investigators and harass you in a manner which to an unknowing person may seem to have reasons based on some past event(s) related to this person when the accusations and information/images are completely fabricated by their system.
What these people are doing to you has nothing to do with investigation (obviously) and their system has no forensic capability whatsoever other than retrieving mostly erroneous data collected during the monitoring period so keep this in mind when they try to pretend they've been monitoring you for your entire life or that there has been some ongoing investigation which has been open since some date which will change every time you point out that they're full of s***. The system is designed to provoke you emotionally so they can generate response statistics which the system will use to determine how to interpret and link descriptions with data captured about your memory references. Once they have consistent statistics the system will use previous 'references' and inject them into your subconscious thought during normal activity in conjunction with what I have previously described as 'impulse injection' to convince you that the response was your own and influence you to complete or describe the reference by making the appropriate verbalizing or performing a related action. You can fight and/or control this if you learn to defeat the memory attacks as I have mentioned in the post titled "Doing something about it".
Once they see what you respond to emotionally they will fabricate 'conversational' scenarios based on events or topics they know will capture your attention enough to distract you from the system's influence. Everything these people say to you is a lie and they really don't care about truth or accuracy - their intent is to manipulate your behavior for reasons you will never be able to determine. They will constantly run you through a 'verification' routine where the system probes you for a particular set of responses repeatedly. If you are interacting and countering these probes the operator will vary the routine in an attempt to 'verify' via different methods. Once the system 'verifies' the selected responses they will be used in the next wave of harassment routines - the process is endless and you will see the effects clearly if you are consistently defeating the system.
They will try to give you the impression that you are being evaluated based on random criteria related to your personal goals and begin running a routine which will again use the above mentioned methods of injection and blocking to convince you that you that they are erasing and/or controlling your mind/memory when in reality the system is controlling the 'fabricated or falsified stream' while interfering with [overriding] your recollection. Once you become dependant on the system's output (or they believe your responses to it are consistent) they will begin to fabricate 'subconscious responses' which they will pretend are indicators of honesty/dishonesty, positive recognition, anxiety, etc, and they will use 'impulse injection' to convince you that the fabricated responses are your own. If you are unaware of this constant manipulation the system will begin to shape your thoughts and behavior. They will use this to [attempt to] restrict your thoughts and behavior by blocking [interfering with] your memory while these suggestions are being provided - the interference is triggered and can be activated at will by the attackers. Again if you learn to defeat the memory attacks as mentioned previously you can not only see through the system's attempts to manipulate but also manage their ability to evaluate your responses by controlling the verification process, work through the 'memory blocks,' and counter the system's ability to influence your choices. It will begin to feel as though you are thinking in two 'threads.'
None of what these people are collecting could ever be used in a case against you. Every piece of information collected by their system can be considered falsified and/or fabricated because the system is designed to continuously provide 'suggestions' according to data which has been previously collected about your current activity and the accuracy of the reference descriptions [definitions] is extremely low since the attackers don't really care about truth and the system will fabricate statements and/or imagery while they are abusing you. The fabrications are generally the result of misinterpretation of references and emotional indicators as well as distortion of 'injection feedback' in addition to false entries added manually by the attackers as a result of their inability to understand what they are viewing or their malintent. There is no reliable way for the attackers to determine what is true even if they try to apply their observations to the aforementioned indicators. An attempt to prove guilt with their system would be the equivalent to a cop dropping a gun at a crime scene and claiming it belonged some individual who happened to be passing by - RANDOM and FALSIFIED. There is no legal application for this system or anything generated by it. They will only capture what they want to abuse you with and when they decide to 'censor' your thoughts they will force you into an abusive or incoherent thought pattern using the injection and blocking methods mentioned above. You can limit and counter this effect by learning to read memory while blocking their system however it takes quite a bit of skill and self-awareness. I have described this as 'quenching' in a previous post. If you can do this their attacks will simply be an annoyance to you as you can work around it, but it will still hinder performance tremendously as you will be forced to test and validate memory constantly and the physical sensations of the system radiating your brain will be both irritating and distracting. Note that these attacks can be performed successfully at lower intensities and you will only notice them in you are frequently testing. I believe the attackers raise the intensity simply out of incompetence or malicious intent since they obviously dont comprehend the values of stealth.
Understanding the memory attacks are key because if you do not recognize modification of your 'active memory' the system will cause you to briefly lose time perception which may be enough *procedural [functional] disorientation to influence you to respond to an injected impulse. Forced speech for example. It is possible for the system to influence you to speak unwillingly or, at the very worst, without you knowing it. For example if you are susceptible to the systems influences you may not realize the it is frequently or constantly influencing you to make minor choices. These motivational impulses can also be used to influence you in a manner that will give you the desire to speak, and I emphasize desire because you need to understand that these impulses will make you feel the urge [at higher levels set by the attackers] or basic motivation [at baseline] to perform the tasks it is influencing you to do. Now in combination with this motivation to speak the system uses past references to direct you - for example you personal memory of turning to speak to your wife and the associated impulse - and when you react to this influence the system will block your working memory while streaming the desired output which will result in you making one or more statements under the system's control. They will test this on you frequently with 'word substitution' and if you can learn to control this in thought then you can control it while speaking but you must learn to multitask constantly! If you do not have a 'working state reference' to return to after this attack it is possible that you will have no recollection of making the statement.
*i chose to describe this as 'procedural' because these attacks are most effective when you are stepping through sequenced tasks so try to avoid 'zoning' on your activities.
This same attack can be used to disrupt your speech if the attackers decide to prevent you from discussing a specific topic or repeating a given word. The system can be configured disrupt your recollection when formulating a related statement or inject gibberish [triggered substitution] while you are attempting to speak.
The goals of these attacks appear to be Censorship, Memory Management, and Direct Behavior Control, however these people are not concerned with legal constraints or any particularly acceptable way of life. They simply use anything you enjoy or appreciate to abuse you regardless of your behavior so if they give you a compliment, realize that they are only doing it to see how you will respond when they negate it and torture you nightly.
If you keep a constant handle on your 'state of activity' as well as your situational perception you will recognize conflicting impulses and although it is possible for the system to overpower your impulses, if you understand the attacks you will be able to recognize the physical changes resulting from these powerful impulses and this should prompt you to re-evaluate your current state. Unless you have been tortured to near-incoherency you should be able to fight the system's influences.
What these people do is purely deceptive, there is no valid or even good reason for any of it. Do not allow them to deter or manipulate you for any reason.
If anyone has read my other posts they already know my belief and position on what they're doing and how to respond. Yes they can read your memory references remotely as well as your emotional states. One thing I neglected to mention in the post abour neural manipulation is that their system's ability to interpret your thoughts is wholely dependant on its ability to predict and influence your 'reference' choices or impulse sequencing during thought composition. The system maps patterns with impulses and identifiers and uses statistical data about your 'composition habits' to predict how you will think or act as you begin to formulate thoughts or prepare to act. The system's ability to define and map these references intelligibly depends on your cooperation [or ignorance] and the attackers' ability to make sense of what they see visually or what they can guess based on your past activity. In some cases they may not even care and will simply fill in nonsense which is counterproductive on their part because the nonsense will invalidate prediction or translation of future activity related to the 'mislabeled' references.
As you learn to defeat the predictive capabilities of the system the attempts to restrict your reference choices will become increasingly evident and you will begin to perceive what I will describe as 'functional duality' [it might also be described as focal duality] within your working memory. The system's prediction error rate will dramatically increase and its attempts to predict your thoughts or intentions will become humorous if not simply annoying. Seeing the relationship between your memory references and the systems output [which can be a specific directed energy attack, an audible sequence, or 'change of mode'] is critical to understanding how to control and ultimately defeat 'thought-tiggered' attacks in addition to preventing the attackers from deceiving you with their cognitive magic tricks. You should be able to redirect the system during formulation or prevent 'predictive integration' altogether but when you learn to stop integration, realize that the system will be waiting for completion and will 'probe' you for a response. It will begin to 'inject' if you attempt to ignore it so unless you have extremely high memory skill and have learned the 'quenching' technique, redirection may be the easiest option. They will also abuse you in every way possible to convince you that they're in control when you will be able to see clearly that they are nothing more than idiots who need to spend more time studying the systems they are abusing people with.
If the system's suggestions are not acceptable to you [and they won't be if you're consistently blocking and/or redirecting it] then this will result in you making a continuous effort to counter the imposition of thoughts and impulses while contrasting your 'working state' to maintain active focus. Although by cooperating and allowing the system to interpret and define your daily activity you may find that the suggestions become more tolerable as the system is designed to mimic your normal cognitive behavior, I would recommend not allowing this as you will tend to more readily accept the system's influence, and the purpose of the system influencing you in this manner is to give the attackers the ability to restrict you at will and to allow them to deceive or manipulate you subconsciously. You can only counter these restrictions if you are able to contrast the system's influence from your own willful activity. Everyone who is hearing "V2K" is being monitored in this manner and very probably being influenced as well. The phrases you are hearing should be related to information captured during the 'silent monitoring period' and will eventually be used as the foundation for your endless verbal harassment.
What they do is a game of deception and manipulation, nothing more. Do not accept anything they say as truth and do not acknowledge anything the system interrogates you about as truth. The system will take random bits of anything it captures through your senses and fabricate stories which they will use to harass and interrogate you with no intention other than to distract and torture you into submission [to the system's influence].
A poster at FFCHS mentioned 'Brain Fingerprinting' in response to one of my posts regarding neural monitoring and the method descriptions definitely match some of what these attackers have done to me. If you learn to defeat the memory attacks I have described above then you can render 'Brain Fingerprinting' useless or manipulate it to your advantage.
As I write these idiots continue attacking me. We need to consider the potential future (or classified current) applications of the systems which are being used to atttack us. I am at least 99% positive that the system I have described is the heart of their operation and I intend to drive a stake through that heart by showing those who are responsible for the development and deployment of that system that unwarranted torture and manipulation are not gainful uses for their system and that the idiots attacking us are simply wasting their resources and undermining our government.
We have a war on our hands. These people are trying to use this system to convince people to accept the influences of this system by injecting subliminal impulses which will coerce people who are unaware to behave in accordance with the attackers' will. With correctional and investigative applications on the horizon we cannot allow these methods to become a standard. The validation error rates are phenominal [meaning the system couldn't detect truth even if the victim told the interrogator repeatedly] and the system is mainly designed to manipulate rather than detect therefore interrogators who are unaware of the depth of the system's manipulative features may not realize that the system is generating the response characteristics which might be attributed to a suspect's habitual or subconscious behavior. This may result in waves of false trials and convictions and permit attackers to falsify test results and testimony in a way that the legal system is not designed to detect or accommodate.
We cannot allow this to be ignored any longer.