Neural Isolation and Electronic Stimulation Triggering: Controlling Your Mind Against Invasive Tech.

This blog gives advice to those that are experiencing un-usual thought patterns. What I mean by this is when you begin to experience feelings, thoughts or even voices that are not part of you.

The complexity of neural triggering comes down to the state of high tech electronic devices that have been scientifical designed with the purpose to distrupt brain patterns.

The premise of this technology is more simple in principle than many assume but in sciencific experiment the way they have gone about gaining access to the human mind has the use of practical methods of ‘problem solving incorporating psychology with technology.

In 2009-2010 BBC Horizon featured a programme called The Secret You which hinted at this technology. One machine featured in this program was able to predict the answers of a test subject 8 seconds before the person replied to yes or no answers. This experiment was conducted in a laboratory using a high powered brain scanning machine developed by the Company Siemens which coincidently design and make mobile phones.

Also in the program, Scientists were able to identify areas of the brain which stored memories through neural stimulation. This involved using a cap with electronic sensors placed on a subjects head so to observe brain activity. The subject would be shown various pictures , mostly ones found in the media and from history where each one would produce a response in the mind thus isolating a part of the brain where the thought would reside. For example, if you were shown a picture of a celebrity, the machine would be able to detect if you had certain feelings such as sexual desires, admiration, distaste and so on for this person based on the neural connections formed in the brain.

At the time of airing on tv, the program covers technology which would be quite primitive against todays claims of high tech neural weaponry.

Dealing with a problem such as distorted thinking involves understanding how the mind works first before dealing with the consideration that your own mind might be interfered with outside sources. We also must consider that if you as a person use or abuse alcohol and drugs that this is not the best thing you can be taking to establish if you are being electronically manipulated and also goes against your crediblity.

Reading on psychology and simple mind/emotional coping techniques are a good place to start. Despite the information regarding the mental health services, the recent intergration of “mindfulness “ and encouragement of meditative techniques are in fact highly useful. They are in fact the main techniques that will help you establish control over your own mind. However, it is advised that the use of psychiatic medications should also be stopped, especially neuroleptic mediations that induce severe drowsiness.

Neural “triggering” is something that you can not so much observe but “experience” unless your are of course the scientist on the other side whom is observing.

The problems is isolating the “triggered” thought which in essence is not a clear “voice”, but is simply a machine simulating parts of the brain with small electronic pulses.

The act of controlling someone elses thoughts is like that of a series of collisions or creating links in a chain, one impacting the other that create a “train of thought”, such as the expression, one precedes the other.

The predictability of ones thoughts and actions with todays modern technology has been made easier for scientists given the amount of data that is collected on us every second.

However, neural stimultation is a level too far.

Meditation Methods: The Monkey Mind.

Meditation is an exceptionally great tool for controlling thoughts. In fact it is a highly important tool for inner emotional and spiritual development.

The monkey mind is a part of our consciousness that most of us dont pay attention to. It is also known as the subconscious mind, a state of awareness that sits between the awakened and sleep state or the concious and unconcious mind.

The subconcious monkey mind as it dubbed, is used to described the chaotic nature the mind has at deciphering the environment. This may seem a strange concept to some and perhaps a bit extreme to call the mind “chaotic”. However, in states of meditation the monkey mind can make its precence known when using methods to quieten in the mind.

In relaxed states , the monkey mind is far easier to experience as your concentration pulls from reality in to a state of conditioning. For example, close your eyes and try to focus on your own breathing for a minute or two. Do you find after a while your thoughts wander? That is your monkey mind fighting sgainst your own will to quieten as it slowly turns off from the world around.

Taming the monkey mind enables clearer thinking, thus meditation serves as a great way to develop a state of no thought, which resides in the sub-conciousness mind.

This feeling can be described as the point of falling asleep or awakening. However I find that ill defined.

Controlling the subconcious mind and making use out of it is what makes our minds special. For when in a state of calm and control we can use a place of no thought to introduce new thoughts or control one thought at a time.

Dealing with intrusive thoughts that are suspect of electronic harassment.

Dealing with intrusive thoughts can be difficult. In this respect we are talking about a symptom that is respectfully like borderline schizophrenia. The experience of voices or thoughts that feel alien to us.

It is a fact that all of us have a state of monkey mind which can run off at its own will. That can include voices and thoughts. This could be be simply recalling memories from the day or from the past. Therefore, they will include your perceptions and point of view of events.

In terms of Schizophrenia, the good news is that ALL of us hear voices or to put it another way, all of us can hear a voice in our heads when it comes to memory recall.

What can be worrying is when these voices are out of control. Certainly for some with Schizophrenia may describe their experiences differently especially when they maybe frightening to that person. However, the development of ones inner knowledge must also be understood to be that of darkness and light, good and bad. Therefore enlightenment is not always a happy experience

However, the use of meditation is a universal gift of humanity and can therefore allow us to control these thoughts if given the right knowledge to do so and also to control negative emotions.

If you want to know how important the sub-concious mind is to you then it is worth knowing that it is part of a persons awareness that is targeted by cults, organised religion and almost indisputably an area identified with mind control in organised harassment.

Identifying intrusive thoughts

In a controlled semi-concious state it is possible to hear neural triggering.

Having tested this numerous times it is clear to me that neural stimulation is actively having effect on the monkey mind.

What I have deduced is that the experiment is about pinging the brain for activity and then observing what it was that was pinged throught the use of cahrged particles in the air.

Therefore sometimes what you may hear or feel was the result of an electronic pulse aimmed at a specific part of the brain which has been stimulated.

You might be able to identify these thoughts, voices or sounds differently to the ones you hear around you. They will not be distinct or clear but can be random. That being that the voice or sound will not be a full sentence but more like short phrases.

Stimulating the brain only requires small electric charge but must be strong enough to penetrate bone and flesh. Alongside this, if the machine being used to conduct signals is behinf walls or some distance away then it will also have to penetrate walls and so on.The other thing we must consider is the size of neurons and nerves contained in the brain and how vastly complicated it would be to isolate specific ones when confined in a place with no apparent electronic machinery.

The other perception is that triggered thoughts are being created by the brain itself. That is that the monkey mind is constantly making sense of reality and therefore thoughts can be unhinged, this firing off neurons that hold a specific feeling or visual/audiable memory. However, this is something that can be produced by repetition and pattern. Certainly when it comes to computer applications the introduction of icons and patterned information in the simplest unassuming of forms can unfortunately be a programming you can not immediately detect without careful observation. In fact it could take a few years until you see daily patterns.

The human body holds a charge of that equivalent to that of 12v battery and therefore the directed electric charge required in the air must be of greater value to have an significant effect. If the monitoring is in realtime then there must also be equipment present in proximity to measure the electrical activity in the brain. This could be perceieved as a form of radar, xray scan etc but it could also be percieved as radio waves that most of our communication devices connect to such as wi-fi. Considering the nature of these technologies are able to penetrate thick walls then the ability to pass through the human body would present no real obstacle. It would mean that we would essentially sit in a form of ether that we can pass through being as the atomic structures in all matter including our selves are almost transparent on an atomic scale. To compare, a typical hydrogen atom comprised of one nucleus and electron are divded by a gap that on a real scale would be the equivalent to a few miles. If we were to compare this to the atomic structures contained in the bodies of living things then this makes us almost like a sponge that can absorb water. Therefore our bodies can pass through a network of waves or web of electrically charged air.

Wifi devices such as internet hubs and mobile phones both use this ether type of frequency transmission.

Scientific principle.

Because we are all studied to a broad extent the main flaw or gap in these systems is scientific boundaries. Also for the sake of scientific principle each person around a targeted person or subject must be divided. This is where ip addresses or identification number have been a consideration for people across the world. Alongside the concepts of microchipping and implants, the need for advanced surgury might be of no requirement. The web ether we pass through is already here.

This is not to say implants will not be used and that the claims of implants used on targeted individuals are a hoax. The fact that people know there is a problem and are talking abouy it openly means that we are not completely under control.


Gangstalking Techniques: Transport and Social manipulation.

Having looked at some of the coded methods used in psychological manipulation on transport, this blog looks at how it is incorporated into real-time operations,

How perps are able to reflect coincidence effectively in realtime.

The nature of how perps use the tactic of indirect language/sound on transport is a curious subject making its way into TI communities. It is also a looking glass into how effective this tech is and how it relates to mass mind manipulation.

Transport Gaslighting.

For a majority of the planned events, most are used in co ordination with street perps using street theatre. Transport used in operations generally tend to use fixed plates and certain advertising that is paid for by the government to be used in specific areas at certain times. Therefore this does not require complicated technology, only a presence.

Technologies used in Real-time.

One specific technology used on certain vehicles that exists isn’t to far removed from fiction. It is found in the film Goldfinger on the famous Aston Martin used by James Bond.

The DB9 uses a turn style number plate system which can interchange three different number plates within a barrel. Albeit a primitive design needing an extension to house the interchanger, it is not something we see on modern car designs.

The deceptive principles of this tech are not that difficult to achieve today considering the vast leaps in technology and it is likely to have been around for sometime when prototypes were being developed and tested. Certain perp issue plates are electronic display devices that can change to adapt to changing situations using the data file on the target. These plates are linked into an onboard computer that connects wirelessly to the mainframe computer. Naturally these plates cannot be changed on the roads in front of the public and normally have to be done out of sight using perps from outside the area.

Otherwise, local perps use a broad range of plates that are used for sensitization techniques. Generally they are non-specific. Examples of these are plates that incorporate 666, 999, 911, MI5, MI6 etc.

For more directed attention to the target the plates used can be changed if needed but if a target is a resident to one area these plates are not often changed but make up a series of aspects suited to the targets life.

A change of plate can sometimes be an issued order from perp controllers. A perp is either given money to buy a new car, ordered a new custom plate or is given a new car directly.

However as some targets know, the reflection of personal information can at times be too accurate to be possible using co-ordinated operations. Some of these events are planned well in advance and are practised on the roads before a target even goes near an area.

Therefore, electronic plates are sometimes used to fill the gaps. They will look exactly like standard plates, almost unidentifiable. They can be detached where some will be wireless and others with a small wire connection linking straight into the cars computer.

These vehicles will normally be introduced onto routes from quiet lay-bys, usually estimating the ETA of the target and adapting as necessary. In specific areas, perps need transport in numbers in order to subtlety manipulate traffic situations in order to get perps into position. This of course means controlling the speed of unassuming drivers. With the use of intelligence, civilians using predictable routes can also be shadowed to draw attention to plates and advertising if needed.

Civilians using registered plates sit on a database that is analysed in real-time on our roads using onboard mobile devices. If these devices are off or not present, then traffic cameras and satellite act as the eye to fill in what it can’t track.

How manipulative and accurate is this technology?

Staggering. Even to those unaware, traffic can be manipulated to very high efficiency around one or multiple targets. It can also control movement to isolate targets from those they know or bring them together if needed.

However this requires deep study of the targets actions, reactions and movements.

In terms of transport manipulation, this still categories under social manipulation where mobile devices can be used as prompts to control and time a multitude of individuals at any given time. This includes distancing Ti away from each other or introducing individuals that are subject to study.

Psychological control usually emanates from mobile devices depending on the nature of what the target is looking at during the day, through to the conversations they have. The subject matter or suggestion is usually a subconscious trigger where as previous events of the targets day to day lives are used as diversions or to other purpose.

Engineered coincidence.

Transport is also used by perps to highlight coincidence to targets whom are stationary, usually when at home. The “Newsfeed”, a function found in Facebook which generates random articles is one example of a linked process in the harassment program, as well as the functions in apps and programs.

If a target is to flick through their newsfeed, a series of co-ordinated events can be used to highlight sensitivity to specific articles. The program will select an article to show in the newsfeed while streaming downwards, one which has not been shown. A perp transport, normally one which is doing a circuit with others will travel past the house of the target. The program will then synchronize with the perp car computer to time its actions with sometimes distinct accuracy.

Sometimes perps need transport close to the targets address in order to arrive at the passing point in time.

Facebook is essentially the public view of the target against the information data harvested from search engines, advertised back at the user. This is exactly the same why community harassment works. It mimics the actions of internet social networking and data mining.

Organised Harassment: Transport

Update: I tweeted this post on the morning of 5/07/17


The morning of 5/7/17 I had decided to drive to a location I am familiar with. I has a small car park and is frequented by friendly types. The journey there was like any other I take. Plenty of perps and a vast variety of reflective tactics.

Considering the time frame, this was done in two hours since the post. These two car were not present on my arrival but were when returning. In the second picture the car was parked next to mine whilst the other was directly opposite.



Main Article

Road activity has increased since the arrival of smartphones as most have GPS technology, there are many reasons why a person could assume that being a driver today is harder than it used to be in some respects. True it is, but what is it actually like to be stalked on the road in real-time be it busy or quiet? How can a person notice the difference and how could it be possible to navigate or concentrate while all this happens?

The first thing I can say is that for the person who is not a TI, the frequency of this activity is not purely confined to harassments operatives, in fact they use human error as cover.

The frequency of traffic of millions of people can give a clear outline of peoples ability to deal with what is a stressful activity for many. That being that yes accidents happen but a majority of the time, traffic is able to flow each day without fail. That is millions and millions of people that are able to look after each others safety everyday.

This blog will include some insight to some highly sophisticated technology that is being used 24/7 and in real-time on targets and other people of interest at large. When you see it, it cannot be unseen, especially when a highly coordinated operation is in full swing.

You may have read about how targets can be sensitized to stimulus such as noise, colours, words, signs, in fact anything that the stalkers want you to be focused on.

On the roads drawing your attention to details is one aspect that is used often, therefore if you are a driver, stalking tactics used can be highly dangerous as many of them are designed to cause accidents. The operation is designed in such a way to avert blame away from the perpetrators but is also used to relay messages.

Car Licence Number Plates

Drivers in the western world have been able to use private number plates instead of the legal Reg plate that comes with their vehicle for many years now. It is a common thing and is often used for advertising.

Private plates allow a vehicle owner to customise a short message into their plate. It typically incorporates up to three words but the average is around two at most. The least that can be used is one letter and one word.

As legal requirement, a private plate is not allowed to spell out a word, it must incorporate number.

For example, if we were to make a plate with the sentence, “Word Up” then this plate would need to incorporate numbers such as Wor4 UP so that there is not a direct message applied to the plate.



A few years ago, the presenters of Top Gear caused international outrage during filming of an episode in Argentina.

The plate H982 FKL seen in the episode is code for HI (19)82 FKL(Falklands) and is what is considered to cause the most offence, as it is a reference to the Falklands War which Great Britain was involved in. The licence number H982 FKL is a legitimate British plate which dates to the late 80’s where the first letter of the licence number would change from year to year. From 1980 to the late 90’s this ranged from the letters A/B/C/D/E/F/G/H/J/K/L/M/N/P/R/S/T/U/V/W.

The second car with Plate N269 KNG or N(B)(F)(I) KNG is less obvious but references the following:

  • NB: To note the matter at hand

  • 69: A sexual position which involves simultaneous oral sex known in the Karma Sutra as Congress of the Crow. Perhaps ironic, the matter at hand involves no hands implicating the sexual position.

  • KNG: Normally short for King and can also apply to the last syllable of fuc(king) which in respect to the preceding numbers seems intentional.

In order, the message could imply “Take note of a hands free fucking”. This could reference the “Exocet” missiles Argentina fired at HMS Sheffield, sinking the ship

The third car EKH 646J presented a bit of difficultly to decipher but it seems to reference the number of Argentinian casualties 649 with the second car implying to invert the last 6 in (646).

Taken from Wiki, the expression:

Ekh (expression)

Ekh (Russian: Эх) is a spoken interjection in Russian and certain other Slavic languages. Ekh-ma (Эх-ма) is closely related.[1]

It is typically spoken by itself or at the beginning of a sentence, and can be used to express wonder, feeling sorry for something, reproach, pride at a just-accomplished feat, and other strong feelings.

“Эх, как важно развернулся! Фу ты, какая пышная фигура!” (“Ekh, how splendidly he’s getting on! Phew, what a magnificent figure!“) – Taras Bulba by Nikolai Gogol

In all, the message that seemed to be wanting to get across was that against 258 British deaths the Argentinians suffered far worse. The argument presented is that the plate H982 FKL was pure coincidence and that the presenters had no idea they were driving around with cars that were causing offence. It is well known that there has been history between the presenters and the BBC and it is probable that this was a tactic deployed to sabotage their careers. It is also debatable that the event was staged.

If one licence plate can cause such offence, imagine what an entire sequence can do to someone.

From experience, a car that was sold to me has reference to the government and a major world event. It was deliberate and the car was chosen for the purpose of sending a message. The way it is designed also made me question wither the car is used to relay the message to other targets should they have been sensitized to this system.

Further information

Coded Sentence Generator

This is a program used within a co-ordinated planning system that involves databases of many factors.

The whole idea is to attempt to relay a message across to a target without raising any suspicion in densely populated areas. This is the tactic used in organised harassment and it requires the use of data harvesting in real-time and a co-ordinated effort to relay information as soon as possible to the target.

This system is not confined to transport alone and incorporates many avenues which can find its way into the eyes of the target. If the message can be sent directly, frequently and where the target has no other option than to view the message, then this can act as part of the “coincidence” that targets experience when harassed.

If one is able to observe the operation as a whole and document it, one will notice patterns. Where operatives are used, consistences like a car which is use to relay a particular code can stand out. Therefore this is easier to evidence against that of e-mail and advertising which is being used as “coincidental” harassment,

An operative will be assigned one or a number of transports for use in harassment or maybe required to modify their current plates with private or issued plates. There are operatives in most areas of a country where cities tend to use different systems to those that are densely populated. It takes into account the way of life and the nature of the environments.

One of the most covered aspects of numerical and alphabetical coding is modern acronyms. Some targets report the frequent use of three numbered emergency codes such as 911, 999. In terms of intelligence, MI 5 is a commonly reported acronym incorporated into Reg Plates along with all number variants MI1, MI2 Etc.

In America (but not confined to), plates will include FBI, CIA and variants of PD, police departments. The list of Acronyms that can be used is endless simply because the harassment system can incorporate anything that it wishes to construct a “theme” around a target.

It does this through an artificial intelligence system that is already operative 24/7. It is much like a hive that is ordered but to create the “theme” specific members of the hive will be called upon “on demand.” This brings the un-ordered theme into an ordered sequence of events.

The AI system gathers enough intelligence on the target to pre-plan events. Considering how quick the system is, the plan is delivered by text message or though more sophisticated means where their is more participation required.

Particularly in street theatre, perpetrators many have to learn mannerisms, ways of dressing, coping the actions in videos or anything that is personal to the target.

This can be delivered by instructional video typically a cloud server that is access (read only) and will not be stored on the perpetrators phone for evidence purposes.

In respects to individual targeting, the events are always observed, studied and researched, looking at reactions, reaction times and other aspects of interest.