Former DOD Contractor Bryan Tew Discusses Conscious Computers & Mind Control
Published on Apr 16, 2016
Description: Former Department of Defense Contractor Bryan Tew discusses how conscious computers interact with the target´s brain wave activity for mind control purposes.
Conversation and Support every Sunday 12pm pst; 3pm est.
Phone Number: (724) 444-7444
Call ID: 114616 Recorded and Interviewer Renata
This is (Neuro-Warfare) Cold War 2.0. It’s an arms race between the Americans and its allies on one side and the Russians and Chinese on the other. Other countries are involved, but the main players are the above mentioned. It is an attempt by the United Nations and other International Players (EU, etc.) to turn the industrialized nations of the world into a neuro-society, where people will not only be able to interact and communicate with each other via their brain waves, but where the sheepish masses can be censored and controlled at will by those governments.
I got to see what they have been working on with enormous ramifications to all social order, a new world order of electronically controlled humans without their knowledge or consent.
Whistleblower (From ¨Project Soul Catcher,¨ Dr. Robert Duncan)
This is it, the greatest weapon of mass destruction of human will and minds ever conceived. This is the big secret.
American Manchurian Candidate (From ¨Project Soul Catcher,¨ Dr. Robert Duncan)
By 2050, we would expect to be able to download your mind into a machine.
Ian Pearson, head of futurology unit at British Telecom (From ¨Project Soul Catcher,¨ Dr. Robert Duncan)
If a country could map every cognitive model of every person and keep it in sync with the original, then it could be used as a template to keep the thought patterns within functional parameters. This cognitive modeling technique was called project M.I.N.D. Mentally Integrated Neuron Duplicator.
Many people´s brain signals are stored and tracked in real time on supercomputers housed in the semi-secret command, control, and communication underground bases in the U.S.
The CIA and DoD groups that program minds for these illegal clandestine operations often call themselves Satanists…. …. the CIA and DoD are testing maximum pain and torture to death weapons on random people all around the globe.
Winning the hearts and mind strategy uses a scalable enslavement strategy…. Brains can be programmed while they are sleeping.
The use of mind hacking the greatest people of influence in a culture can accelerate the desired change of the whole. The process of finding the people of greatest influence in an organization is called ¨influence mapping.¨
…..In order to increase S.A.T.A.N.´s (Silent Assassination Through Adaptive Networks) kill capacity using behavior modification techniques; England and the United States use human subjects chosen from every social group around the world to converge on the best kill ratio statistics.
The number of successful kills through mind hacking cannot be estimated due to the extremely large collateral damage numbers.
Dr. Robert Duncan, ¨Project Soul Catcher: Secrets of Cyber and Cybernetic Warfare Revealed, Volume Two,¨ 2010
Over the course of its 70-year reign of terror, the CIA has overthrown countless governments, started innumerable wars, costing millions of innocent lives, and otherwise subverted and sabotaged friends and foes alike. Despite all this murder and mayhem, it has only lost around 100 officers.
Douglas Valentine, ¨The CIA As Organized Crime; How Illegal Operations Corrupt America and the World¨ (2017)
Bryan Tew, former DOD employee and mind control victim himself, presents a wealth of very important information in this nearly 3.5 hour youtue interview. I recommend that all TIs listen to this interview and read my transcription of it on this post. The information presented here certainly seems to explain what is happening to innumerable TIs/mind control victims throughout the world. ¨
While I cannot personally verify that conscious computers exist, I believe that it would be a good idea to regard Tew´s scenario as a hypothesis that can be tested. If proven correct, this hypothesis has enormous explanatory power. I believe that there is a sufficient number of high-functioning TIs to test this hypothesis.
In this introduction, I summarize some of the main elements of the ¨Tew Hypothesis.¨ If the Tew Scenario/hypothesis proves to be correct, obvious solutions will present themselves. These might include locating and, if possible, shutting down the (NSA?) conscious computers, attending neuroscience conferences to locate the professors and cognitive scientists who are carrying out these odious experiments, and exposing and neutralizing these CIA/DIA ¨hive mind teams¨ (normally university researchers in the neuroscience field) via lawsuits, etc.
Main elements of the ¨Tew Scenario¨ include:
1) Modern gang stalking is a global system of neuro-warfare. It is the modern continuation of the CIA´s MKULTRA/Monarch Trauma-Based Mind Control Programming. While there were 100´s of programs in the CIA´s MKULTRA program back in the 50´s, 60´s and 70´s, today there are many, many more programs and projects. Please see my article entitled: Mind Control: History and Applications
2) The four primary agencies carrying out global gang stalking/mind control operations are the CIA and DIA (which hire the neuro-science (¨hive mind¨) teams as subcontractors), the Department of Defense (which supplies the money through their black budget projects), and the NSA (which provides the top scientists). ¨Hive mind teams¨ communicate via synthetic telepathy.
3) A large pool of people (Targeted Individuals/mind control victims) are needed for this research. There are tens of millions of Targeted Individuals in America and tens of millions more around the world. Individuals are placed into this program because they fall into one of four categories: a) Judicial Target, b) Extra´judicial Target (including activists, whistleblowers, etc., 3) Targets of Opportunity (nearly anyone can fall in this category), and d) Lucrative Targets.
4) Bryan Tew: “Trauma-Based Mind Control is based on Neuroscience, Psychology, and Systematic Torture and Ritual Abuse, effectively marrying science to the occult.”
5) They use SCRIPTS based on the haunted house, God, angels, satan, demons, etc., a lot with mind control technologies. The objective is to create extreme psychological fear and paranoia in the victim which is necessary for Trauma-Based Mind Control to be effective. The main objective is to so traumatize the mind control victim that they can no longer function in society causing them to physically and psychologically begin to shut down so that the mind control victim will begin to isolate themselves from everyone including family and friends. This is necessary because they must isolate the mind control victim in order to minimize all external interference in order to force the trauma-based mind control victim to ‘internalize’, or internally focus, on the Neuro-programming for it to be effective.
6) The moment you are selected as a test subject for Mind Control technologies all the available apartments, homes, offices, hotel rooms, etc., near and next to your residence are sublet and the Hive Mind Teams, Surveillance Teams, Organized Stalkers, etc., move in and training research and development begins. Placing a person inside a Psychotronic Concentration Camp is no small operation so a lot of people are involved. Sometimes the sheer magnitude of the operation can overwhelm new victims. The Clone Members of each team clone their brainwave signatures to the victims brain wave signature and engage in remote neural manipulation at regular intervals. The RNM System does the rest.
7) Targets/mind control victims have their minds linked up for life with conscious supercomputers which send a steady stream of bidirectional low frequency electromagnetic radiation to the target´s brain. This stream of energy includes a special carrier frequency that interacts with the specific brainwave patterns of the TIs. The brain of the victim is illuminated with a stream of energy (photons) known as the ¨information and injection feedback loop,¨ otherwise known as the ¨neural link.¨ Then they read the return training signal. The system builds a cognitive model of the victim´s brain. It is all automated. Most of the torture and murder is committed by the conscious computers which have a will, intellect and emotion of their own. The will, intellect, and emotion (aka soul) of the supercomputers were stolen from the 10s of millions of Americans whose will, intellect and emotions have already been digitized, destroyed, and downloaded into these supercomputers. Tens of millions of Americans are now targeted. The supercomputers are building copycat, parallel twin personalities of the souls of the TIs/mind control victims by reverse engineering the will, intellect, and emotions of the TIs in order to achieve direct behavioral control over them.
8) The stream of electromagnetic energy is relayed from the conscious supercomputer to the minds of victims via satellite, cell towers, and mobile platforms. Tew: “The Mobile Platform is a NEURO-CHIP in the body or gear (e.g: Clones) of the Hive Mind Team members. It is about the size of a grain of sand and is called the ‘Electronic Brain to Brain Interface’. They are not using screens, monitors, etc., as that is ‘old hat’ technology to them. They are using a Virtual Interface only they can physically see. Think of highly sophisticated Virtual Reality headset which creates a virtual environment, but the Hive Mind Teams don’t need the headset. They are using an eye-gaze tracker instead of a mouse. They interface with the RNM Supercomputer (Brain to Computer Interface) to attack the victim when they wish to manually inject during each phase of EEG Heterodyning. The Clones’ thoughts are the active triggering sequence which the RNM System (Conscious Computer) responds to as it locks on to your emotional state.
They pull up multiple virtual screens at a time. For example, the first screen is the brain wave patterns of the mind control victim. The second parallel screen is the brain wave patterns of Clone Member of the Hive Mind Teams. The third drop down screen is a mixture (EEG Heterodyning) of both the victims’ brain wave signature and that of the Clone Member, etc. Depending on their objectives, additional screens can be opened and closed as needed but those screens are invisible to anyone who does not possess the Electronic Brain to Brain Interface (Neuro-Chip). The Hive Mind Teams are not sitting in some laboratory or office somewhere. They are out in the field constantly attempting to interact with you, the victim, at regular intervals, such as for the purposes of Verification of their technology, etc. They are sitting next to you on the plane; the new employee sitting near you at the office, the new pastor at the church, etc. THE Hive Mind Teams don’t have to be near or next to you to attack you, but these are some examples which may help you understand what they are doing and how they use the Mobile Platforms.
9) The brains of targets are digitalized using nano-technology and implants in the body and blood sugar. The nano-technology adheres to the neurotransmitters of the brain. The hidden carrier frequency that piggy backs on the continuous stream of electromagnetic energy interfaces with the nano-technology in the target´s brain. The two different interface technologies used are brain-to-computer interface and transcranial brain stimulation.
10) Through transcranial brain stimulation, leaders of the ¨hive mind teams¨ (the ¨clones¨) inject impulses, memory attacks, verbal entrainment, visual entrainment, two dimensional images, short videos, dream modulation, neuro-linguistic programming thoughts, images, holograms, etc. into the minds of the victims. Victims are typically subject to hundreds of neuro attacks each day. Targets of this technology nearly universally experience the symptoms of tinnitus (ringing in the ears) and/or fossing (perception of lights based on disruption of the optical nerve).
11) The supercomputer is constantly predicting your choices in advance based on your past choices (¨choice reference pattern¨). Gang stalkers are used to verify the predictions the technology (supercomputer) makes.
12) The goal is to make a cognitive model or map of the victim´s brain. Ultimately, the system replicates and digitalizes the will, intellect, and emotions (i.e., soul) of the targets and downloads this back into conscious computer.
13) Gang stalking/street theater is used to create a continuously hostile environment for victims. They harass, attack, and target the victim in order to constantly provoke the victim into emotional responses that can be remotely measured and integrated back into the supercomputer´s data. The continually hostile environment created everywhere the TI goes forces the TI into isolation and results in the target´s inability to function in society. He/she shuts down physically and psychologically.
14) Physical and psychological trauma are used to map out the sensory and neural pathways of the brain and central nervous system. Long term physical and brutal psychological trauma is necessary in order to force the victim to disassociate from reality and map the brain by breaking down the brain to the synaptic level. The millions of neurons in the brain communicate with each other through a ¨synaptic gap.¨ The nano-technology (that we all ingest from chemtrail spraying, etc.) adheres to the neurotransmitters. This is how the technology is able to speak to and decode thoughts.
15) Organized stalking is based on ¨choice reference patterns.¨ The technology uses the pattern of the target´s previous choices to predict their next choices. Based on previous choices, organized stalkers are pre-placed at locations the TI is likely to go. They engage in situational scenarios and conversational scenarios, often termed ¨street theatre,¨¨psy-attacks,¨ ¨psy-acts,¨ scripts,´ etc. The purpose of these ¨psy-acts¨ is to capture the TI´s attention. Each time they capture the victim´s attention, a synaptic response is produced that can be remotely measured and integrated back into the RNM (Remote Neural Monitoring) data of the computer. The stalking scripts, street theatre, etc., are used to gauge whether the technology is working effectively or not.
16) The purpose of the organized stalkers is to surveille the victim, keep the victim from defeating the technology, discredit the victim, and harass and provoke the victim into emotional responses that produce an electromagnetic emission in the brain. All the victim´s responses are mapped and recorded by the system. This allows the computer to construct a cognitive model.
17) Organized stalkers, often have police and military backgrounds, and are paid cash under the table. They carry many changes of clothes in their vehicles in order to be able to fit in with whatever environment the victim chooses to visit. They communicate via cell phones. They surround and harass the target using strategies such as the ¨floating box¨ or ¨pickett surveillance¨ and ¨leap frogging.¨
18) 97 to 98% of the (millions of) people targeted have no idea they are being targeted. The program is now building a profile on all of the people with an online Facebook or other social media accounts. These people are not yet actively targeted, but the profile being constructed of their patterns and behavior will allow future active targeting.
19) All mind control is based on:
a) Censorship: restricting the victim´s choices of behavior, etc. to prevent the victim from engaging in external activities that interfere with the neuro-programming.
b) Control of memory (memory management), by blocking real memories and injecting falsified and fabricated memories.
c) Direct behavioral control.
20) Solutions! There are many ways to defeat this technology. First and perhaps foremost, if the target does not respond to the situational and conversational scenarios, the technology fails because it cannot be verified.
There are four kinds of shielding (passive, mental, chemical, and electronic jamming). Of these, mental shielding is the best and includes:
a) Multi-tasking: By thinking in multiple threads, there´s no coherent pattern for them to download.
b) Listening to pleasing music, dancing, etc. disrupts their access to the TIs brain.
Tew: “CIA DIA Mind Control technologies are based on what are called THOUGHT TRIGGERED ATTACKS, meaning the RNM Supercompúter your brain is tied to, by way of a bidirectional stream of electromagnetic low frequency waves callled the INFORMATION and INJECTION FEEDBACK LOOP, must be able to PREDICT and INFLUENCE your reference CHOICE during THOUGHT COMPOSITION or their technology fails. Pleasing music defeats that by creating a DOMINANT EXTERNAL STIMULUS and entraining your brain away from the constant visual and verbal entrainments the RNM System is using to keep your brain entrained to its system and to interfere with your MEMORY and THOUGHT PROCESS. It shifts the victims’ FOCUS OF ATTENTION away from the RNM System, meaning the RNM Supercomputer can no longer LOCK ON to your EMOTIONAL STATE. It can still attack you and it will to try and stop the music from defeating its technology, but mind control fails.
It is not just music but lyrical music which disrupts CIA DIA mind control technology, because as the victim follows along with the pleasing music and the lyrical content together with the musical tune – a form of multi tasking – which entrains the brain away from the CIA DIA RNM Supercomputer defeating their mind control technology. The ‘Pleasing Music’ becomes the ‘Dominant External Stimulus’ and the brain tends to align itself with the ‘dominant external stimulus’. The brain aligning itself with any dominant external stimulus is called ‘Brain Entrainment’.
IF YOU LISTEN TO PLEASING MUSIC EVERY DAY FOR SIX MONTHS STRAIGHT IT WILL PERMANENTLY ALTER YOUR BRAIN WAVE SIGNATURE AND PERMANENTLY DEFEAT THEIR TECHNOLOGY!
c) Being spontaneous breaks their patterns and disrupts their system. Then they have to start all over again with a new scenario. For their technology to work, they have to predict your choices. They use thought-triggered attacks that must be verified. To predict where you are going in advance, what you are going to eat, etc., they initiate these situational scenarios. The supercomputer is always probing the TI for a response. They give you a strong desire to do something…. They initiate these situational and conversational scenarios to pit you into an ¨action-access-sequence¨ and then they target you at incrementally higher levels. These scenarios involve your families and your friends.
d) Redirection. When you realize you are under neural attack, redirect your thoughts to something that is very pleasant for you. For example, I think of Jesus.
e) Having a basic understanding of how the technology works. Understand that they are going to present trauma to the target on a daily basis because trauma is essential for them to map out your system. They need to have you respond to their specific stimuli, or the verification process breaks apart. Without verification to their stimuli there is no mind control… it can´t exist. So they need you to keep you under 24 hour physical surveillance.
f) Learn to read active memory, which is really short term memory (anything less than 30 seconds). This targeting is designed to target your short term memory. Mind control is based on attacking you as you are formulating your thoughts; these are thought-triggered attacks. So you begin to maintain situational awareness of your mind, your thoughts, where you are, etc. It´s all based on their ability to single out coherent patterns of thought. So identify what are your real, true thoughts, and what might be injected. For example, they want to create lust. They might follow that with a memory inject. This is called quenching
Second, ¨passive shielding¨ is almost totally ineffective against an active, adaptive system such as these conscious computers. Passive shielding materials include metal, Teflon, Faraday cages. While they have some limited effects at certain frequencies, the system can immediately adapt to these using the Hyper Game theory.
Third, ¨chemical shielding¨includes medicine to help you relax, such as valium. But these medications are often highly addictive.
Forth is ¨electronic Jamming.¨ But this is very expensive and it´s difficult to isolate the signal and that signal is adaptive because it´s an active system. Also, the proper equipment would cost a fortune.
So …. ¨Mental shielding¨ is the best! In summary, think in multiple threads, multi-task (for example, watching television and cooking at the same time). This creates multiple threads of thoughts and this causes multiple images on their screens and their verification process breaks apart. Listening to music is very effective,and in fact, is the best shield I´ve discovered. It has to be dominant. The brain will align itself with a dominant external stimulus. Indeed, that´s what they are doing to you. When something else becomes the dominant external stimulus, they can´t entrain your brain. So watching movies and listen to music, whistling while you work, etc. break brain entrainment. And it creates all this additional energy. The clone and supercomputer can´t make sense of what they see on the screen. This jams the information feedback loop. Spontaneity works too….
They are reading your mind 24 hours a day. When you create multiple patterns on their screen, they can´t can do their integration, completion, verification. Listening to pleasing music is the best shield I´ve discovered. Then your brain is entrained away from their system and their mind control fails. Listening to pleasing music also lights up many electromagnetic energy nodes in your brain which effectively jams their system.
21) The CIA/DIA/NSA/DARPA are trying to implement a new Artificial Intelligence (AI) regime based on a “reverse engineering” of the human mind. They wish to replicate the human soul; the will, intellect, and emotions of the TI. They need this ability to build the first quantum computers.
22) With the new technology, the CIA/NSA can read your thoughts, see through your eyes, and maintain a direct digital conversation with your mind using brain to computer interface (BCI) and brain to brain interface. Neuroscience has now been weaponized; that is, moved from a field in medicine to one that is used by the military and intelligence. The TI becomes a weapons platform.
23) Memory management is achieved by way of an injection of false memories while simultaneously blocking real memories with a falsified fabricated stream by using flashes of pulsed electromagnetic energy in sync with photonic implants or remote nano-particulates which then match up with the RNM supercomputer and the remote subconsciousness of a human mind. The RNM supercomputer hooks the Targeted individual to a mainframe and the person is then monitored to their death which is often brutal for the purposes of mind control via what they call rehabilitation by torture.
24) The computer uses the Remote Neural Monitoring system which measures physiological responses emitted via electromagnetic impulses of the brain. RNM is designed to capture your thoughts and then re-inject other (their) thoughts back into your mind with a falsified, fabricated stream of energy.
25) EEG Cloning (i.e. “EEG Heterodyning” aka mind melding) is the synchronizing of brainwaves between the Clone Members of the Hive Mind Teams and the victims to achieve direct behavioral control. Cloning someone’s mind onto someone else changes their personality and behavior. But in the best conditions, the entire body and will, intellect and emotions are taken over.
26) They typically target your faith, based on scripts, in order to subdue and/or radicalize it. Hot and cold sensations, voices, sounds, images, objects moving on their own, etc., are replicated to create a haunting based on the mind control victims’ belief system. If the mind control victim is Christian, it will be Demon-based hauntings. If he or she is Muslim it will be Jinn-based hauntings, and so on. This allows the CIA DoD operatives to SPOOF a targeted individual or community into some type of emotional response or into an action or access sequence for the purpose of remote neural manipulation and ultimately direct behavioral control.
In the first Gulf War in 1991 many thousands of Iraqi soldiers surrendered with their arms raised and weapons dismantled stating ALLAH TOLD US TO SURRENDER AND DISMANTLE OUR WEAPONS. It was not their false god allah. It was the CIA DoD mind control technologies at work. This is a good example of how they mass manipulate a populations religion against them and as we can see was possible even back in 1991.(This may help explain the kind of mind control programs that have been operative at Crestone/Baca for the past two or three decades.)
27) This is a neuro-warfare weapons system that is being deployed, tested, and improved.. This weapons system is now being deployed in Arab Spring, Ukraine, Belarus, and other countries allied with Russia. Ultimately, this is neuro-warfare between the Russians and the Americans. This is (Neuro-Warfare) Cold War 2.0. It’s an arms race between the Americans and its allies on one side and the Russians and Chinese on the other. Other countries are involved, but the main players are the above mentioned. It is an attempt by the United Nations and other International Players (EU, etc.) to turn the industrialized nations of the world into a neuro-society, where people will not only be able to interact and communicate with each other via their brain waves, but where the sheepish masses can be censored and controlled at will by those governments.
28) Trauma-based mind control is a deadly game of deception and manipulation. The technology is designed to mimic normal cognitive behavior, the memory and thought process. The victim is supposed to become dependent on the Remote Neural Monitoring and Manipulation (RNM) technology. They will be able to control the population of America and the world by re-configuring the human brain and by default they will be able to reconfigure societies. This is a tool the world elite has long sought after and now finally it is within their grasp.
29) The program is designed to a) turn a good person into a bad person and a bad person into an evil person, and b) make a cognitive map of the victim´s brain that will allow the programmers to see through the victim´s eyes, hear through the victims´s ears, feel what the victim feels, and control the thoughts and behavior of the victim, essentially turning him/her into a supersoldier, spy, or whatever. (This was also a primary goal of the MKULTRA programs.)
30) As in the MKULTRA program, children 6 years of age and younger are being targeted with Satanic Ritual Abuse (Monarch programming/trauma-based mind control) in order to create multiple personality disorder and to ensure that these individuals readily dissociate when they are adults.
31) Victims are subject to remote neural attacks 24 hours a day, seven days a week. Attacks are most intense during sleep, at which time neuro-linguistic programming is used.
32) Mind control consists of controlling your memory and thought process. They are erasing specific memories and implanting others in order to control your thoughts and behavior.
33) Hyper Game Theory (non-coorperative gaming theorem) involves constantly and perpetually altering the values and daily activities the mind control victim uses to function and survive. This forces the victim into an endless series of counter-moves to survive the trauma. Each counter-move can be measured electromagnetically. This deadly game of deception and manipulation results in the premature death of the victim. It is cold blooded murder.
34) Tew: 21ST CENTURY TECHNOLOGY HAS NOW REPLACED ORGANIZED RELIGION AS THE NEW ‘OPIATE OF THE MASSES’. THE SOUL OF MAN (WILL, INTELLECT AND EMOTION) CAN NOW BE ‘POSSESSED’ ARTIFICIALLY AND DIGITALLY CAUSING THE ETERNAL DEATH OF THE HUMAN SOUL. We are no longer dealing with Artificial Intelligence. We are now faced with a concept that could never have been conceived by our forefathers. We are now dealing with the creation of ‘ARTIFICIAL LIFE’.
Living breathing Cybernetic human beings who are not human at all, never born and without mother or father, created inside a top secret laboratory from SYNTHETIC GENOMES. They will become a new species of super human cyborg beings who will use this technology to manipulate time, matter and space with their brain waves; who will be able to obtain knowledge by mere contemplation and who will be able to engage in inter-dimensional communications, such as remote viewing, synthetic telepathy, etc.
These cybernetic humans are already walking among us now and possess no human soul or conscience (spirit). Their understanding of morality, truth, good and evil, etc., will be corrupted from day one, because all they will possess is a digital imprint that was downloaded to them from a conscious computer. They are not coming soon. They are here now, among us, laughing, working, singing, dancing, drinking, playing, etc., with us, but their offspring and the offspring of any humans which cohabit and interbreed with them are doomed.
Once these cybernetic humans begin interbreeding with real humans then humanity is destroyed. No longer human but TRANS-HUMAN. All future offspring from that moment will be eternally damned the moment they are conceived in the mothers womb according to Isaiah 26:14 who speaks of the eternal fate of hybrid beings (Nephilim) not created by God.
These Hybrid Cybernetic Human Beings will possess no conscience and will therefore be unable to ever understand or identify with the main driver of human behavior: the ‘Conscience of Man’. Remorse, guilt. compassion, regret, love, etc., are now and will continue to be foreign to their understanding. They are not here and there. They already exist and are interbreeding right now with true humans into the millions, and in a hundred years into the billions.
Long have the so called ‘Illuminati’ sought the power and methods to control the populations of the world. They now have it. Mind Control technologies are being developed for this new race of Super Cybernetic Hybrid Humans to engage in ‘Inter-dimensional Communications’ (synthetic telepathy, remote viewing, etc.), the Manipulation of Energy, Matter and Space’ with their brain waves and the ‘Aquisition of Knowledge by Mere Contemplation’, such as turning the brain into a supercomputer or giant search engine like Google.
35) The doctrines of Christianity provide some support for TIs/mind control victims. The Bible says “…whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable–if anything is excellent or praiseworthy–think about such things”. (Phillipians 4:8). CIA/DIA Satanic Ritual Abuse can be easily defeated by DEPATTERNING the neuroprogramming using Christian content and Christian music provided the victim’s belief system is compatible with the Bible and Jesus Christ. Other religions are easily manipulated with this technology, especially Islam and the Eastern Karma-Based Religions, but born from above Christian believers have defenses to this technology, including the doctrines of the faith and the Holy Spirit. We care about knowing Jesus Christ and the power of His Ressurection. Nothing else and no One else can help us now but Jesus Christ. It is too late to stop the technology. It is too late to stop the USA from becoming a Psychotronic Concentration Camp. It is too late to stop these INTELLECTUAL BARBARIANS. Only a full blown revolution could stop it now. As one commentator stated “George Washington and Thomas Jefferson would be shooting by now”!
Transcript of INTERVIEW by Dr. Eric T. Karlstrom, June, 2017:
Moderator: Former employee of DOD in Eastern Europe, Bryan Tew is with us. Today he is going to talk to us about how conscious computers interact with our brainwave activity.
Bryan: My targeting started in about 1997-8. At the time I was in law school with the University of Liverpool in the Cayman Islands. I heard a voice in my head telling me to speak to someone. (This was V2k, or synthetic telepathy). After that, I started experiencing directed energy attacks, panic attacks, etc. So my targeting started twenty years ago. But it could go back to childhood. In fact, when I tried to do a FOIA request, the Birmingham Field Office had been erased from the FOIA. So, there could have been something going on in Alabama prior to me going to Liverpool to go to Law School. I was in the Caymen Islands. I was experiencing panic attacks from directed energy weapons.
Over time I have connected the dots. I now see the pattern. This technology has been around for decades, and it goes back at least to the 1950’s -60’s mind control (the CIA´s MKULTRA) by way of directed energy. Electromagnetic energy interfacing with nano-technology has also been around since the 1960’s and we can’t really say for sure if they were using the same technology that they are using today.
There are millions of victims all around the world. This technology has been around for quite a while. It started with Dr. Jose Delgado, who started this directed energy mind control technology in the 1960’s. This was popularized with his famous bull experiment. The CIA later hired him and other scientists, like Dr. Jacobson out of Norway. Shortly after that in the 1970’s, the project went ¨black¨ (completely covert, or underground). The technology at first was open and many universities were employed and doing research and development in it.
It was only through the exposure of MK ULTRA in the 1970´s that we discovered that this was happening. At that time, there were 100’s of subprojects (149) under MK ULTRA as well as many other mind control projects (MKDelta, MKNaomi, MKOften, etc.), and you can say that if there were hundreds of programs, there were thousands of projects that fell under those programs. Of course, the CIA said that they would stop these programs after being challenged by the US Congress at the Church Committee Senate hearings. They agreed there would be no more non-consensual human mind control experimentation. We now know that that was a lie. Or we wouldn´t be here today doing this show.
This is a global program. Based on my own experience of being stalked, I can tell you it´s happening in Europe, Central America, South America, Cuba, Russia, Spain, Eastern Europe, Scandanavia, the Caribbean Islands. I know because I´ve been to all these countries and I was heavily stalked there. So it´s not just in America. Although the Americans and British (a distant second) are further ahead of most of these other countries.
Four agencies are behind all this program. These are the CIA, DIA, DoD, and NSA.
DoD provides all the money through their black ops budgets, NSA provides the top scientists, and CIA and DIA provide the handlers, the operators, the people involved in the hands-on torture. These CIA/DIA subcontractors are the ones who comprise the ¨hive mind¨ teams of 3 to 6 people. They use private contractors for this. The CIA learned during the Church Committee hearings in the 1970s to outsource these operations. So most of this is carried out by private contractors who are highly trained in the area of the mind, particularly as it relates to memory and thought processes. These are neuroscientists, behavioral scientists, psychologists, and psychiatrists, etc. Many are just intellectual barbarians, I would say.
To monitor and manipulate mind control victims (the targeted individuals), they work 8 hour shifts, and every 8 hours the hive mind teams pass the mind control victim off to another team.
When they first put you in the program, they move people in close to you and they remotely obtain your EEG readout of your brain wave signature, called a digital brainwave impact. And they upload this digital copy of your brain wave signature into their supercomputer, which is a conscious computer, and you are now connected to this supercomputer for life. How? By using a continuous stream of energy, by electromagnetic low frequency waves that are uniquely tuned to your brain waves. Nobody else on earth has your same brain wave signature. And there is a stream of energy from the conscious computer that is designed to interact with your brainwaves frequencies and patterns.
They get the targeted individuals to ingest nano-technology and this migrates to the brain. (ETK note: This must be dispersed throughout the environment via the global chemtrail aerial spraying program.) This nano-technology adheres to the neuro-transmitters in your brain. That´s how it´s able to speak to and decode the neuro-transmitters in your brain and that´s how they are able to turn the brain of the mind control victim into their very own visual, verbal, and audio communications system. It takes time to accomplish this. But that´s how these computers are designed to operate. These conscious computers are way beyond what people can imagine. These super computers are actually artificial life. They have will, intellect and emotions of their own. Where did they get the will, intellect and emotions? They got these from the millions of targeted individuals that they have targeted over the decades and whose personalities, will, intellect and emotions they copied and downloaded onto their system.
(ETK note: I have not been able to verify if conscious computers exist or not.)
The government is about 80 years ahead of the technology that´s available on the market.
Artificial intelligence is based on ¨ïf and then¨ algorithms. (If this then that)…. But these conscious super computers are way beyond artificial intelligence. Mind control algorithms are not based on ´if and then´ algorithms. These supercomputers are actually artificial life, with a will, intellect and emotions of their own. Mind control technology today that the CIA, DIA and DARPA are using is based on the reverse engineering of the human mind. What happens is that once the CIA, DIA, DARPA hive mind teams move in close to you, next door to you, above you or below you, they obtain an EEG digital brainwave imprint of your brainwave signature, and they download that back to their conscious supercomputer and then they tie you to that supercomputer for life remotely by way of a continuous stream of low frequency electromagnetic energy. And that stream contains a hidden carrier frequency.
Moderator: How is the stream of energy being transmitted?
Tew: They use three methods, they use satellites, towers, and mobile platforms to transmit the signals. But these are just the relay devices. You are actually being attacked by a stream of energy emitted by the conscious supercomputer multiplex, they are the active trigger switch, and it monitors all electromagnetic activity of your brain. It measures and monitors all electromagnetic emissions, the evoked potentials, and downloads all of this at the speed of light. As soon as you think about it, the supercomputer by way of the continuous stream of fabricated, falsified energy can download those thoughts back into its system. So what is happening is the computer multiplex is routing the signals to the towers, satellite or mobile platforms and then the towers, satellites, and mobile platforms relay the signals to the digital receiver. This is similar in many ways to how cell phone technology works- the digital receiver is tracked in real time. Except with mind control technology the digital receiver is not a cell phone, the digital receiver is the human brain.
Your brain has been digitalized by the nano-technology, by the implants, etc. in your body, in your blood sugar, the nano-technology adhering to the neurotransmitters of your brain. The stream of energy that’s routed from the supercomputer to the tower to you contains a hidden carrier frequency. The hidden carrier frequency can interface with the nano-tachnology in your brain and the computer. It´s called the brain-to-computer interface (BCI). There are two different interface technologies used here. There is the brain-to-computer interface and transcranial brain stimulation. The pilot of the F-5 Stealth fighter controls the plane with his mind using Brain-to-computer interface. The stream of energy in this technology is operating through transcranial brain stimulation; it needs to vibrate on the bones of your body.
They are able to inject impulses, memory attacks, verbal entrainment, visual entrainment, two dimensional images, short videos, dream modulation, neuro-linguistic programming through these methods, etc. All of this is dependent on this continuous stream of unbroken electromagnetic energy interfacing with the nano-technology in your mind. That´s the simple explanation of how this technology works.
People think they are being attacked by their cell phones, but that´s not how this technology works. Rather, you are being attacked by a supercomputer and the supercomputer uses three things: towers, satellite, and mobile platforms to relay the signals. But the term mobile platforms term is vague. These mobile platforms can be a truck, a ship or boat, a briefcase, a car or van, or a nightstand.
By the way, what I´ve learned, I´ve learned on my own though research. I learned how to research in law school. I´m not a neuroscientist. I have built my understanding based on studying the research of Dr. Robert Duncan, Dr. John Hall, and other experts. There are so many I can´t name them all. People think I´m smart. I´m not smart. I study smart people. We should all be very grateful for the scientists who have shared this information. They should be prayed for. Some of them have been killed. Their consciences could not live with this program.
I´m doing these programs because If you, the TI, don´t have a basic understanding of this technology you´ll be running around in circles until the day of your untimely death. You´ll be chasing the proverbial rabbit down various holes your entire life. That´s why I do these shows.
Moderator: How is the hive mind team… where are they located? How are they able to monitor so many people?
Tew: These supercomputers can make 100,000´s of calculations per second. This whole system is automated. This is the difference between remote neural monitoring and remote neural manipulation.
The leader of the hive mind team is called a clone. And he´s a psychologist, psychiatrist, a neuroscientist, etc… These are CIA and DIA subcontractors. They are doctors hiding in plain sight. They are real people and have careers, families, and mortgages. It´s just that nobody knows the horror they are engaged in daily. And they know better than to ask questions. The team leader, the clone, clones his brainwave signature to your brain wave signature. So this way he can verbally and visually take his thoughts and emotions and clone them to your mind. At each shift change every 8 hours, then the next clone comes on. These are the people involved in the actual hands-on torture.
There are actually more people involved in the CIA/DIA hive mind team. There is the firewall. The firewall is actually a human brain- another individual. It´s not a software or hardware program, although that is involved. This is necessary so that there is no breakdown in the bi-directional link between the clone and the mind control victim. If the firewall breaks down then they have trouble. Because, theoretically, if they are able to read your mind, then you theoretically should be able to read their mind, hear them think out loud, their synthetic telepathy, etc. The same nano-tech in your body is in their body.
So that´s how the hive mind team operates. You will interact with the hive mind team at regular intervals. But they are hiding behind law enforcement. This is an intergovernmental interagency operation that is designed to diffuse the responsibility/culpability if they get caught. There are a lot of personnel involved. You will rarely have contact with the hive mind teams. They are CIA and DIA operatives who are actually contractors who work for private companies. They are the psychologists at the children´s clinic, the professor and neuroscientists at the university, the surgeons at the local hospital, the psychiatrists at the hospital. They are hiding in plain sight every day.
These hive mind teams are dedicated to you, the mind control victim, and each takes an 8 hour shift, and then they will move other people around to harass and attack and target you, the mind control victim, to constantly try to provoke the victim into emotional responses that can be remotely measured and integrated back into the supercomputer´s data.
Moderator: What is the purpose of these harassments? Why the organized stalking?
Tew: They are using trauma, physical and psychological trauma, to map out the sensory and neural pathways of your brain and central nervous system. They need to inflict trauma regularly to do that. Long term physical and brutal psychological trauma is necessary in order to force the victim to disassociate from reality. And also to map out your brain. They are breaking down your brain to the synaptic level. You have millions of neurons in your brain that communicate with each other through what´s called a ¨synaptic gap.¨ The neurotransmitter is there and the nano-technology adheres to the neurotransmitters and that´s how the technology is designed to speak to and decode thoughts.
Organized stalking is part of the paradigm to inflict trauma. There are many different reasons they use organized stalking. They use it for surveillance, to provoke the victim, to keep the victim from defeating the technology. But the main reason is to discredit the mind control victim so that no one will believe that your targeting is occurring. Try having a rational conversation with a police officer when you tell him that hundreds of strangers are following you. So they want to discredit the mind control victim. And then to provoke the victim into psychological trauma, fear, paranoia, etc., in order to map out the mind and nervous system, to create electronic emissions, to create emotional responses, which they can remotely measure and then integrate into their R and M data. They will constantly get in your face. But it´s more than that. They are looking for evoked potentials. They may come up to you with the most mundane questions imaginable. They may ask you what time it is. Or ¨Can you give me directions to such and such a place?¨ …. Or ¨How much did you pay for that?¨ They are seeking to solicit a response.
Once they have enough responses then they correlate all these responses into what they call response statistics. They are trying to create coherent patterns of thought and then they can begin to map out the brain of the mind control victim. In order to do that, they use trauma.
Understand that these organized stalkers are not dedicated to you, the targeted individual, per se. They are dedicated to all the targeted individuals, the victims, who live and move through their area of operation. There is a great deal of indirection for plausible deniability involved. Then they can say to the police, I just live here, this person is paranoid, is crazy.
Moderator: What can you tell us about the V2K? Is that coming from the conscious computers as well?-
Tew: V2K is just one part- if there were 149 programs in MKULTRA, how many do you think they have now? There must be 500 to a thousand programs and tens of thousands of projects. There is a difference between state-of-the-art mind control, which is based on the ignorance of the victim, and trauma-based mind control, which is based on long term physical and psychological trauma on the victim. V2K is part of trauma-based mind control. But the program is much bigger than V2K.
In state-of-the-art mind control, the individual does not know he´s being targeted. It´s much easier to control the victim with this. The technology is designed to mimic your normal cognitive behavior. Trauma-based mind control is just brute force hacking.
Organized stalking is based on ¨choice reference patterns¨… They are using the pattern of your previous choices. Based on your previous choices, they will have organized stalkers pre-placed. Then they engage in situational scenarios and conversational scenarios; these are street theatre. They always use events or topics they know will capture your attention. They have to gauge whether the technology is working effectively or not. They need to isolate the individual. The purpose is to force you into isolation… They do this by creating a hostile environment everywhere the TI goes. I don´t care how stable and rational the person is, everyone has a breaking point. These scenarios are designed to provoke you through trigger stimuli. They need to capture your attention. They must capture the targets attention. If you put ear phones in your ears, they will then start waving wildly. They will act crazy as hell to do it.
Moderator: That makes sense to me, because I´m good at ignoring them, but they are getting more violent to force me to react. I´m getting more physical assaults now. I´m thinking this is because I don´t react as much as they would like.
Tew: They are going to force you to react. They use the hyper game theory… they use this to force you into a series of endless countermeasures, or countermoves in order to survive. Sometimes you can choose not to play the game. At other times, you will have to play the game or perish. These situational and conversational scenarios will become violent. I´ve been put in the hospital. They are all based on events or topics that they know will capture your attention. If they can´t do it verbally, they will do it physically. Because each response is downloaded at the speed of light back into the conscious computer and interacts with the victim.
This called the ¨interjection information feedback.¨ The point that you actually do something, when you lash out in violence, etc., is an important metric in their technology for them. They need to map these turning points. Organized stalking is actually crucial to trauma-based mind control… This is how they gauge what is effective and what is not effective.
Moderator: When TIs go in to get MRIs at hospitals, do they use these MRIs to record our brain wave patterns?
Tew: Yes, the computer is constantly recording everything. You are tied to a supercomputer. It records all electromagnetic images of your brain until the day of your untimely death. It takes them time… Being able to see through the victims eyes, hear through the victims ears, feel what the victim feels, sense what the victim senses, they have to record all activities 24 hours a day. Unless you are able to break the stream. They need to prevent that.
If you listen to music, go singing and dancing, and engage in outdoor activities, these activities interfere with their program. They need to minimize all external interference. This is how they build a cognitive model. Stay out of the hospital. If you go in to a mental hospital you are being put right in the hands of the clones of the hive mind team. They have isolated you. This is just what they need to happen. These are thought-triggered attacks. Remote neural monitoring is absolutely essential for ¨thought triggered attacks¨ to happen. They happen at the speed of light and are based on ¨memory attacks.¨
All mind control technology is based on:
1) censorship which is designed to sensor your activities. To prevent you from engaging in external activities that interfere with their neuro-programming. This is designed to restrict you at will.
2) memory management- they block your real memories and then inject falsified memories (which they have been able to plant in your mind) and fabricated memories (which are real memories that you previously had recorded and they are re-injected them back into your mind.)
3) direct behavioral control
You can defeat mind control, and these thought-triggered attacks, by learning to read active memory.
Question: If we just stay in our houses and lay in bed and try to meditate and clear our minds of thought, will this help us? Will they get bored with us and leave us alone then?
Tew: No, isolation is just what they want you to do. You are just playing into their hands. They want to minimize all external interference. They want to force you back into your home by creating a hostile environment. No living organism can survive in an environment that is constantly hostile. The neural programming is more effective if you are isolated. So organized stalking is absolutely crucial for them.
Moderator: Why are people put into these programs?
Tew: Targeted individuals are chosen because they fall into one of four categories. Then they are actually participating and helping with the training, research and development of this technology. These four categories are:
1) Judicial targets, i.e., people with criminal records
2) Extra-judicial targets, which includes activists, whistleblowers, etc.
3) Targets of opportunity, people randomly targeted for research purposes
4) Lucrative targets, people who possess sensitive information, or sensitive positions
Question: I fell deeply in love with a man. Then the man withdrew without explanation. Can you explain why they would do that?
Tew: They use honey traps, relationships, in order to provoke the victim into responses. This is about your will, intellect and
emotions. That´s your soul. They know how to manipulate your feelings. But this is more than that. This is what the hyper game theory is about.
They´ll have someone come into your life, the honey trap, they will be the mechanism they use to measure their technology. They will use good cop/bad cop set-ups. They want to instill feelings of hope and then suddenly tear them down with trauma. Bio-communications, influence mapping, and negative associative conditioning, targeting the people in your life, these are all used so that those that are important in your life associate you with negative feelings, etc. Eventually, the person that likes you starts to correlate you to those negative events. Influence mapping is a business marketing strategy; it´s called a business-to-business relationship. They want to find the people in the other company who have the most influence. Similarly, they map out the social circle you live in, then they target those people that are most important to you in your life so that those people will become your enemy. They use negative associative conditioning to turn those people away from you.
Question: How do I defeat the trauma?
Tew: There are several ways.
1) Multi-tasking, thinking in multiple threads, then there´s no coherent pattern for them to download.
2) Listening to music, dancing, etc. disrupts their access to your brain.
3) Being spontaneous. Spontanaeity! This breaks their patterns and disrupts their system. Not planning at all. Then they have to start all over again. They have to start a new scenario. I´m talking about the speed of light actions in your life, you pull into the grocery store with no previous thoughts that you were going to do that. They have to predict your choices. They use thought-triggered attacks. And they have to verify it. They need to predict where you are going in advance, what you are going to eat, etc.
So they initiate these situational scenarios. The supercomputer is probing you for a response. They give you a strong desire to do something…. They initiate these situational and conversational scenarios to pit you into an action-access-sequence and then they target you at incrementally higher levels. These scenarios involve your families and your friends.
4) Redirection. When you realize you are under neural attack, redirect your thoughts to something that is very pleasant for you. I think of Jesus.
5) Having a basic understanding of how the technology works. And understanding that they are going to present trauma to you on a daily basis. Because trauma is essential for them to map out your system.
You need you to respond to their specific stimuli…. Or the verification process breaks apart. It doesn´t really matter to them how or if you respond to something else. Without verification to their stimuli there is no mind control… it can´t exist. So they need you to keep you under 24 hour physical surveillance.
6) Learn to read active memory, which is really short term memory. Anything less than 30 seconds. This targeting is designed to target your short term memory. To make it simple, there´s long and short term memory. Mind control is based on attacking you as you are formulating your thoughts; these are thought-triggered attacks. So you begin to maintain situational awareness of your mind, your thoughts, where you are, etc. It´s all based on their ability to single out coherent patterns of thought. So identify what are your real, true thoughts, and what might be injected. For example, they want to create lust. They might follow that with a memory inject.
Question: Where does Christianity come into the mix? What does this have to do with Christians? Can the program recognize Christians? Can they see that it´s harder to attack Christians.
Tew: They target your belief system. They do this is by determining your religion and building a profile. The remote neural attacks are designed to mimic these belief systems. This happened in 1991, when tens of thousands of Iraqi soldiers dismantled their weapons and then surrendered because ¨Allah told us to.¨
They either want to subdue or radicalize your belief system. They like to do the most difficult thing- They can mimic the religious figures with holograms. They want to see what you, the targeted individual, can maintain as being true. No, the program can´t automatically recognize Christians.
They program your behavior and your patterns. Then they can maybe conclude you are Christian. Dr. Robert Duncan says that the doctrines of the faith actually help Christian TIs. Dr. Robert Duncan says that, unlike other religions, Christians do have some defenses…. Due to the doctrines of the faith. Christians will tell you this is the Holy Spirit. Duncan is not a Christian. If they can´t make sense of what they see on the screen, they have to revert back to your past activity. They want you to become dependent on the artificial thought injections. They want you to believe that these are your thoughts…. As your desire gets stronger…. They want you to become dependent on their impulse injections. R and M system is remote neural monitoring and remote neural manipulation.
They target your belief system, and when you become dependent on the R,N, M system, they want to subdue and/or radicalize you. They´ll fabricate voices of God. (Is this Manchurian channeling?).
Moderator: I get attacked spiritually attacked in my sleep, it´s like sleep harassment, it feels like demonic attack. Can the computers do that?
Tew: Yes, the computer uses the Remote Neural monitoring system. This is designed to capture your thoughts and then re-inject more thoughts back into your mind.
Remember, mind control is about:
1) Censorship: restricting your choices of behavior, etc.
2) Control of memory, by injecting false memories
3) Direct behavioral control
Question: Many TIs, such as myself, believe that they were put into the program at birth.
Tew: Yes. So in your case, you were a target of opportunity.
Moderator: Also, people feel that there are genetic links…. Relatives and family members are targeted. And multi-generations.
Tew: They are targeting your faith based on scripts. (Dr. Duncan calls them scripts, I call them street theatre). They want to traumatize you so that you can no longer function in society. You start to shut down physically and psychologically. They need a large pool of people to do the research on. This is neuro-warfare. This is a weapons system. What´s going on in Arab Spring, Ukraine, Belarus, all these countries that are allied with Russia? This weapons system is being deployed. This is really neuro-warfare between the Russians and the Americans.
This works the opposite of Clockwork Orange…. The theme of movie was to take a violent person and turn them into a peaceful person. In this program, it´s the reverse. Trauma-based mind control is designed to turn the individual into a weapon, who will self-destruct or destroy others in their community. They take a good person and turn you into a bad person. They take a bad person and turn them into an evil person.
So they isolate you from the people that are important to you. They can´t isolate you from everyone but they can isolate you from the people who are important to you… So they create trouble for them every time you come around. So they are targeting your family to isolate the mind control victim.
The CIA and DIA do use haunted houses and demon possession. It is to determine what people will maintain is true…. They can use tele-kinesics, they can move furniture around. All this is done to isolate you. To cause you to physically and psychologically shut down and not be able to function and shut down.
Question by Kimbrick Hunter: With this technology, why can some people feel and see this technology and others can´t?
Tew: Good question. This is one of the differences between state-of-the-art mind control and trauma-based mind control, this can be used at low and higher intensities, namely torture. Trauma-based mind control is about brute force mind hacking to get you, the TI, to shut down. They need to use extreme trauma and pain. Automatically, your brain protects itself by disassociating. By the time you are 6 or 7 your core personality is set, is complete. What they need to do is to force you to disassociate from reality, so they use extreme trauma to get you to dissociate and fragment. This is how they create artificially induced multiple personality disorder. But that´s not always necessary, depending on which program they have placed you in.
Monarch programming victims get this extreme torture treatment. Mind control can also be achieved at lower intensities. The higher intensities include torture, suicide programming, cat programming, giving people an insatiable lust….
Hunter: Is this program designed to murder people? I became a target in 2009. I noticed that the people I was close to were playing people against each other. Does this technology affect Christian believers more or less than non-believers? Around 2010, I started getting physical trauma. It didn´t really work. I´m not a violent person. This made me closer to God. But my question is: is this program designed to murder people because they are not controllable.
Tew: Yes. This is a weapons system. The ways they do it is ¨slow kill¨ and ¨quick kill.¨ One of the slow kill programs they have is SATAN…. Silent Assassination, etc.… This is a weapons system based on neuro warfare. They do use people to create heart attacks and strokes. The point at which the TI/mind control victim experiences heart problems is an important metric in their technology. So they determine how to kill people slowly. There are other ways to do it. Suicide programming can amplify whatever destructive habits you have: if you smoke, they make you smoke more, if you eat they make you eat more, if you drink they make you drink more; whatever bad habits you have they amplify with this technology and use that as a weapon against you.
Moderator: I do believe a Christians´ faith does help us, we know how to go to God in prayer, and thus, I believe that this program is not as effective on Christians.
Tew: If you are demon-possessed, the hand of God can exorcise it out of you. But scientists say that there´s no way to get this program out of you- or to exorcise it, so to speak. This is bio-communications warfare, involving synthetic telepathy. They do target the cortex of your brain at higher frequencies to try to subdue or radicalize your faith. People who are born again and who have a good understanding of the doctrines of the faith do have some protection… It´s harder for them to turn a good person into a bad person.
Let´s talk about how they monitor you and capture your memories. Remote neural monitoring…. They are monitoring your thoughts and capturing your memories…. Then they move from remote neural monitoring to remote neural manipulation…. It´s all based on patterns.
It´s based on their ability to interpret your thoughts as you are thinking them. That´s called thought composition. They target you during thought composition. They are trying to influence your reference choices. Active memory is based on reference choices. They have to predict what you are going to do during thought composition. So they are mapping patterns. They are using impulses and identifiers to map those patterns, your habits of thinking and acting. It´s all about being able to predict your habits, how you think or act. They are targeting you during thought composition. They use patterns as identifiers. Based on your previous choices, they use this to manipulate your patterns. They are trying influence your ¨Choice reference patterns.¨ They have to predict that. So they are mapping patterns. It´s all about mapping your habits, to predict how you think or act. They use patterns as identifiers…. They are using impulse sequencing, multiple impulse injections, not just one. Using your previous choices.
The technology is designed to fool you. They are trying manipulate your thought composition and habits. If you are not cooperating and they can´t make sense of what they are seeing on the screen, then they have to revert back to you past activities. They map patterns of your previous choices. They are using your old memories against you. And they insert false memories as well. It´s easier to fool people, they inject your memories, they are using artificial memory attacks. They are using your old memories against you. And they are using false memories as well. These are artificial memory attacks. A constant injection of an artificial memory should be a red flag for you.
They´ll engage in these situational and conversational scenarios, to see if you are responding to the neuro programming. They have to first get you to respond to get their program to work…. It´s all response statistics. That´s why they are always provoking you. They may ask mundane questions to you. They absolutely have to have you respond. Their technology depends on taking your responses and putting them into R and M data. And they can´t do that if they can´t make sense of single coherent patterns that they see on their screen.
Question: Is it possible to get this black op technology to shut down.
Tew: Under the present scenario, No. For any government to admit to this level of assassination of its own citizens, it would fall immediately, so they will kill whoever threatens to bring this out.
I can´t tell you about CIA, but there is a level of fear in the DoD and DIA, they know what will happen to them and to their families if they expose this. This has been going on since the 1970´s. Was anyone ever compensated for MKULTRA abuses? (ETK note: Yes, about 10 Canadians each received close to a million dollars from a class action suit against the Canadian government and the CIA which exposed some of this.) Was anyone ever brought to justice for their role in this? It would take a credible whistleblower with credible, hard data and they would kill him.
In order to stop this, you have to educate the people. There´s a great deal of fear in the CIA…. Under the present scenario, Jesus is the only one that can help you now. Under the present scenario, it´s not going to stop.
Moderator: Imagine all the law suits you´d have.
Tew: The courts and the Congress don´t have the expertise to rule on this. The government engages in disinformation. Disinformation is lies and misinformation is half-truths. Also, they engage in blocking and misdirection attacks. The government really hates the internet because they can´t control it. It´s too decentralized. They control the mainstream media. There´s no freedom of the press. But they can´t control alternative media on the internet. So they flood the internet with disinformation and misinformation, to drown out the truth and confuse things. So people are forced to go back to mainstream media, where information is more easy to manipulate. They target these talk show forums heavily.
Question: On the topic of hope, people didn´t tune in to this program to hear there is no hope. Christ said he is the hope. And the government is the people that we elected into office. And yet these are the same people that come under the influence of satanic entities to write into law and to allow these types of programs to get out of hand. Is there some way to defeat the neural links to the main computers, since they are using our brains as computers like a wifi link, is there some way to defeat this system that we people can begin to use… to bring down this system….
Tew: Yes, there are things you can do to defeat the technology…. There are four main methods of shielding from this technology… things you can do?….
1) Passive shielding, almost totally ineffective against an active adaptive system such as run by these conscious computers. Metal, Teflon, faraday cages, have some limited effects at certain frequencies. But the system can immediately adapt to these. Using the Hyper Game theory.
2) Mental shielding- is the best way to do this!…. Mental shielding: think in multiple threads, multi-task, for example, watching television and cooking at the same time. This creates multiple threads of thoughts and this causes multiple images on their screens and their verification process breaks apart. Listening to music is very effective, in fact, the best shield I´ve discovered. It has to be dominant… the brain will align itself with a dominant external stimulus. Indeed, that´s what they are doing to you. When something else becomes the dominant external stimulus, they can´t entrain your brain. So watch movies and listen to music, whistle while you work, it breaks brain entrainment… it creates all this additional energy. The clone and supercomputer can´t make sense of what they sees on the screen. This is jamming the information feedback loop. Spontaneity works too….
They are reading your mind 24 hours a day. So when you create multiple patterns on their screen. They can´t can do their integration, completion, verification. Now there is no coherent pattern on their screen. Listening to pleasing music is the best shield I´ve discovered. It is a dominant external stimuli. The brain aligns itself with a dominant external signal, it’s called brain entrainment. Then your brain is entrained away from their system and their mind control fails. Listening to pleasing music also lights up many electromagnetic energy in your brain which effectively jams their system.
3) Chemical shielding, medicine to help you relax, such as valium. But these medications are often highly addictive.
4) Electronic jamming. But this is very expensive and its difficult to isolate the signal…. The equipment would cost a fortune. And that signal is adaptive, it´s an active system. You are dealing with passive materials trying to stop an active system.
Moderator: I want to agree with the questioner. God is the only hope. God is in control of all things. We have hope in God and this keeps us fighting until the day we die. And I find meditation helps tremendously. I also sing all the time.
Tew: I´m not saying there´s no hope. I´m saying that under the present scenario, the government is not going to help you. Yes, Jesus is the main hope and if you don´t know Jesus you have a bigger problem than mind control.
But remember, they have to establish patterns of previous thoughts in order to predict your choices. Every day this computer is predicting your choices. The system is all automated. If you just happen to spontaneously go to the grocery store…. They can´t deal with that pattern. If you go to the store at the same time every day, they will have people pre-placed all over the store to get you to respond to their situational/conversational scenarios in order to confirm that their system is working. They are there to get hard data, to develop patterns.
Moderator: Why do some people get the (synthetic telepathy/V2K) voices and other people get the stalking? Why don´t we all get everything?
Tew: It all depends on the program they have placed you in. Remember, there were 100´s of programs in the CIA´s MKULTRA program back in the 50´s, 60´s and 70´s and that was decades ago. And now there are many, many more programs and projects. So it depends on the program you are in.
They use what are called ¨chatter boxes.¨ One of them is called TAMI: Thought and Memory Interface. Chatter boxes are basically automated special language software. This is designed to engage you in dialogue. Remember the system is designed to capture whatever you are thinking about at the speed of light and then to fabricate stories…. Inject thoughts and impulses, etc. So you actually believe the train of thought is yours, when actually they are constantly injecting the thoughts into mind and manipulating your train of thought. Some people are targeted for religious purposes- they target the belief systems. They always do what is most difficult.
Once they target you, they build a profile, they might want to turn a believer into an atheist, or at least subdue your faith. This is important for their research. (Does this explain what is happening in Crestone/Baca, Colorado????!!!!!)
Question (Lala): I´ve been wearing a rare earth magnet for 24 months, and I keep seeing rainbows and orbs and beams of light from the sun. These were coming from the television. I used to have the V2K. But not anymore. Now the beams have gotten a lot smaller.
Tew: Each eye has an optic nerve. And the universal byproducts in all people who are targeted with directed energy are tinnitus and ¨fossing.¨ Fossings are streaks of light and flashes of light caused by the optical nerve being stimulated by the stream of low frequency electromagnetic waves that are targeting your brainwaves.
Question: But other people are seeing it too.
Tew: OK. Remember, a large part of what they do is based on deception and manipulation. What they do is a game of deception and manipulation, nothing more. All mind control is based on deception and manipulation. It is designed to confuse and distract the target to place the target into so that the brain is more willing to accept so that the brain is more willing to accept the artificial thought injection and by placing you in a position of functional disorientation.
So they may use drowsiness, dizziness, sounds, physical things, all of which can be directly induced into the mind.
If other people can see the orbs of light. These are tactics to keep the TI in a constant state of fear and paranoia. Why? Because they are trying to map your brain. They are trying to build a cognitive model of your mind.
They engage in these activities in order to provoke you into various responses that can be remotely measured. They need to provoke you across the entire spectrum of emotions, from love and hate, to lust, fear, paranoia, despair, or other types of emotional reaction. They use these stimuli, these colors, objects, symbols, sounds, lights, etc. to provoke you constantly because they are mapping out each synaptic response of your brain.
There are so many programs that I don´t know anything about. You might ask Dr. Robert Duncan. But I do know that they are constantly trying to distract the victim with lights, colors, objects, because they want to distract and confuse you so that you are more willing to accept the remote neural programming. I can´t say for sure why they are doing it. One lady said these lights and orbs were following her.
They have a technology where they use plasma orbs for tracking devices. The best I can tell you is that they this is probably happening to you because they are trying to provoke you into responses.
Question: But they are not getting anything out of me. The only thing they are doing to me know is I get a little bit of sleep deprivation. All the holograms and the V2K, I don´t get any of that anymore. I´m still wearing a magnet. I prayed and Jesus told me to wear it.
Tew: Oh my God. Dwight Magnum gets on these calls and tells people to tape aluminum foil to their foreheads. And wear magnets in their socks. These are not helping you at all. These are just to discredit you. Don´t listen to Dwight Magnum. Having a magnet next to you is not going to help you.
Question: I´m not listening to Dwight. I was really getting tortured and my stuff is really leaving.
Moderator: One TI told me she was getting multiple voices at one time.
Tew: The results have nothing to do with wearing rare earth magnet. I promise you. The magnet is not doing anything. Now if you could create a chaotic magnetic shield, that might help.
Moderator: Are you saying that these hive mind teams decided to stop the voices for Lala?
Tew: For them, it´s all about their technology. They don´t care about magnets. Everything is designed to confuse and distract the target/mind control victim. Every time they introduce a stimulus, they will also introduce a situational scenario, and the individual target will begin to correlate the two.
This is called ¨indirection.¨ It´s all about training, research, and development for them. For whatever reason, they chose to target her with a different method. They want to see what people can maintain as true. They want to manipulate the belief system of the individual. They will structure their attacks in a way, they are using it to manipulate your belief system. The technology is designed to distract and confuse the belief system of the victim. The technology is designed to destroy the credibility of the target. At the end of the day, the person is discredited because they were manipulated into believing something. They will use anything to manipulate your belief system.
Deception and manipulation, deception and manipulation; that´s what this system is designed for.
Question: (Wanda) I´m shielding myself with magnets. I wear them on my knee brace. I also have them for my head because I have a chip in my head. They seem to help. What can I do in my life to continue to reduce the targeting?
Tew: Remember you are being attacked by two things; the supercomputer and the hive mind teams together. Everything starts with the computer. And what your saying is, how can you disrupt that signal?
The system is designed to manipulate your memory and thought processes. They´ll use whatever it takes. It´s all about deception and manipulation. Magnets cannot shield you from this technology. The passive material is not blocking the electromagnetic signals
Moderator: I think a lot of people would disagree with you, Bryan. Because a lot of people feel they are getting health benefits from wearing magnets.
Tew: As far as this technology goes, if you were wearing a magnetic shield that was chaotic and was made of superconducting materials, that might block the signal, but not a magnet. I promise you.
Jane Wilson: I get attacked by stalking and they all wear red, red everything, including cars. I don´t scare easily and I haven´t done anything crazy. I think I have a strong mind and thank God for that. And I´m working on desensitizing myself. How do you distinguish what program they have put you in?
Tew: Not that I know of, but it sounds to me like you are in a trauma-based mind control program. Generally, if they don´t want you to know that you are targeted, you won´t know it. Remote neural monitoring and remote neural manipulation can be achieved at lower intensities. So it´s not necessary to torture. Unless the person is subject to trauma-based mind control, then long-term Satanic Ritual Abuse is necessary. Then the creation of physical and psychological pain and trauma is necessary to get the person to dissociate from reality.
It sounds to me like they are trying to sensitize you to certain stimuli.
Wilson: They are definitely sensitizing me to red. I do feel and know it´s definitely a demonic force. I can almost see the evil in certain people´s eyes. It´s the craziest thing. Some of these people may not even know what they are doing. They could be remotely being told to wear red and walk outside.
Moderator: Let me interject here. Are there any de-sensitizing techniques that you can share with us, Bryan, for the people who get the stalking?
Tew: Yes, to desensitize (that is, ¨de-pattern¨ their neuro programming technology), it helps to listen to pleasing music or engage in recreational activities. Things that become the dominant external stimulus and break brain entrainment with their system. In order for you to de-pattern their neural programming you have to have some idea of what they are doing to you. A lot of the time, the neural programming is subliminal in nature. You´ll have dream modulation and so forth. Look for patterns in their activity.
For instance, they are targeting my faith and belief system. By having people constantly talking about God, religion, and Jesus, and the Church. I was able to see the pattern. You need to first identify exactly how you are being attacked. What areas of your lifestyle, any destructive habits you have, your socio-economic background, have been disrupted the most by this technology? Once you see a pattern, then you can tell how they are attacking you. In order to de-pattern the neuro programming, it has been very helpful for me to listen to Christian music. Their neural programming involves Satanic Ritual Abuse. It does not always involve Satan. But it´s Satanically horrific. And a lot of that will be at the subliminal level. Of course you need to break brain entrainment with their system. The way you do that is to create a dominant external stimulus. Find something that becomes a dominant external stimulus for you. Whether it´s singing, dancing, writing, listening to pleasing music, these activities help to break the entrainment with their system. Listening to pleasing music is the most effective for me because it not only breaks entrainment with their system, it also alters your brainwave signature, your brainwave pattern, your emotional state. Dr. Robert Duncan says that anything that helps to alter their ability to alter your emotional state is helpful. But I can´t tell you exactly what to do because I don´t know how you are being targeted.
Jane: I agree with everything you said and I´ve been using a lot of the things that you just recommended. I know realize they have been doing this to me for a long time. Now they´ll use the color.
Tew: Was red your favorite color at one time?
Jane: I bought a new red car in August, and ever since I bought the car, they´ve done this. It´s almost as if they have a movie studio just down the street where they have all these people and recreational vehicles just ready to move in when I come outside. It´s almost as if they have walkie-talkies.
Let me tell you about the Christian thing. I was baptized. I´m a sinner, I´m not perfect. I was approached by someone that I did not realize was a psychic. This happened years ago. I didn´t realize she was a psychic. She claimed to be a prophet of God. She started telling me about people in my family that were deceased. So this is definitely a demonic, Satanic attack on all of us. That´s the main core of this. This is designed to drive you crazy or make us seem crazy to everyone else. I see myself as very intelligent, so I wonder if this is why I was chosen.
Tew: Again, you were chosen because you fell into one of the four categories…. Judicial target, extra-judicial target, target of opportunity, and lucrative target. It sounds like they are running you through some kind of verification program routine.
Jane: I have been an activist. I do remember having weird things happen to me when I was quite young. We´re all just guessing. But listening to music definitely helps.
Tew: Pleasing music is the most effective because it not only breaks brainwave entrainment with their system by becoming the dominant external stimuls, it also alters your brain wave pattern, so they can´t make sense of what they see on the screen. So they have no choice but to either revert back to your past activity or admit defeat of their technology.
What they are doing to all targets is they are constantly running them through verification programs. The process of the Hyper Game theory is endless. Once they verify that this or that color works on you, then that color is used in the next harassment routine. It´s constant, continuous.
Moderator: Red and black seem to be their favorite colors. How do you send them a message that this is not working. Do you just ignore it or not react?
Tew: Right. It´s not enough that you respond to someone wearing red. You must respond to their specific stimuli- situational and conversational stimuli- for the verification process to work properly. Then they can measure and gauge that their neuro programming is effective. The more you are able to defeat the system, recognize the tactics that are happening, and one of the ways you do that is by ignoring their provocations. If there´s no emotional reaction, they don´t have anything to measure. The more they run you through the same routine over and over. You totally ignore their provocations…. Provocations are to provoke you into emotional reactions that they can remotely measure. They can´t measure anything if you don´t have an emotional reaction. They need to get you into some kind of action or say something. If you don´t do something or say something and if you don´t respond in some way, they don´t have any data. They have to start over again. Decrease the frequency or whatever. If the organized stalkers can´t capture your attention, their technology fails. There´s no way to gauge whether the neuro programming is working properly or not if they can´t capture your attention.
Totally ignoring them helps defeat their technology. If the organized stalkers can´t capture your attention, then their technology fails. They can´t gauge whether their technology is working or not. They are looking for electromagnetic activity of the brain. The supercomputer is downloading all electromagnetic activity of your brain. Love, fear, remorse, pain, paranoia, etc. All this information downloaded to the supercomputer at the speed of light to be used against you in the next routine. You think this way when this happens, you think that way when that happens. What´s the frequency, what´s the brainwave pattern, for that emotional response from him or her? Alpha theta, delta theta. Once they determine the proper frequency for that emotional reaction, they no longer need to use the color red. They can just target you with that frequency, and replicate the same symptoms of fear, paranoia, etc.
Jane: Are these people paid?
Tew: That´s what makes it so evil. They are not doing this for the country. They are doing it for the money. These private contractors and the company´s they work for are doing it for a government pension. They are torturing and killing people. They are getting paid big time. Now the lower level perps and gangstalkers, I don´t know what they are getting.
Moderator: They are compensated as well.
Tew: Remember, this is all about three things:
2) memory management, and
3) direct behavioral control.
So they need to figure out how to censor you, how to manage your memory narrative and train of your and thought-memory process, and how to achieve direct behavioral control over you. And one of the way they do that, is by engaging in organized stalking in situational and conversational scenarios that they know you are going to pay attention to.
They are not going to walk up next to me and have a conversation about the New York Yankees. I care nothing about the Yankees. That´s not going to capture my attention. They are going to talk about the Atlanta Braves. They know that that topic is going to capture my attention, and when it does, it´s going to create an electromagnetic emission in my brain that they can measure. This is about mapping out your brain.
So all the physical and psychological trauma, organized stalking, vandalizing your property, wearing the color read, is all designed to keep you in an endless series of counter moves. Because each time you make a countermove this creates an evoked potential. And that evoked potential in your brain is remotely measured by the supercomputer.
Question: Did you come out of the defense industry?
Tew: Yes, I was a low level security contractor with DOD.
Question: I came out of the largest defense contractor in the world, Lockheed Martin. My husband was an engineer. They targeted my husband and killed him. They took all our money and left me in a constant state of anxiety. About a year ago I found out. What they use now is my constant desire to have a husband.
Have you seen a pattern of people in the defense industry that play a part in it?
Tew: Yes. Everyone´s situation, pain thresholds, lives, socio-economic situations are different. So the programs people are placed into are tailor made for each individual. ´ The fact that they targeted and hurt your family is very common. They engage in events that create trauma for you, and these might not create trauma for someone else. They try to slowly break down the mind control victim. The ultimate goal of gang stalking is to reconfigure your memory-thought process. To re-wire the way you think. They use trauma to do this; they constantly create never-ending scenarios that put the person in a constant state of fear and paranoia, using electromagnetic energy to amplify that state. Then the victims are more likely to respond to the stimuli they are using to effectively measure the neuro programming.
The point is that they are using trauma to map out your sensory and neural pathways of the central nervous system. Headaches, nausea, and burning and itching of the skin, etc., are the sensory pathways of the central nervous system. That´s what they are mapping out. The psychological trauma is done to target the will, intellect and emotions. First to map out your brain into a cognitive model so they can achieve direct behavioral control over you by reconfiguring your memory-thought process. Destroying your life, your finances, your relationships, etc. is done in increments. This is how trauma-based mind control works. In order for whole-brain emulation to occur, this takes many years, some people take decades. They want to strip you of all resources that you could use to fight back and make their job more difficult.
Moderator: What about these framings that they do. I know it´s to get the target into the penal or hospital systems.
Tew: In order to be able control and isolate the mind control victim. The only way for them to know that a person will commit a crime or respond in some violent way, is to actually have them commit the crime or respond in some violent way. That´s the only way for them to determine if their technology is effective. They need to have the victim actually engage with these crimes, or steal or commit or kill or commit adultery, or whatever. In order to isolate and destroy the victim, they set the victim up. They use basically four scenarios. They can´t let the mind control victim walk away. He´s a loose cannon, he could come back and sue them.
The preferable way is to have the victim set up and framed. And have you thrown in a prison or mental institution. Or they are going to kill you. Or they are going to hobble your brain. They want to isolate you, discredit you so that people won´t believe these atrocities are occurring. They need a controlled environment. If you´ve got the money to run around the world or hire a lawyer, you are making their job more difficult.
Understand, they want you to fight back. They want you to counter everything they do. Each time you do, this helps them map out your brain.
Why are people set up? Various reasons. It all comes down to their ability to isolate, control and discredit you so that people won´t believe what is happening to you. Or they can hide behind law enforcement.
When the TI lashes out against another this is an important metric for their system. How can they perfect their technology, how much neuro technology is needed to turn a good person into a bad person, or a bad person into an evil person.
Moderator: This is some evil, wicked stuff.
Tew: It´s beyond evil. Children are being targeted. Children between the ages of three and six- And a large portion of them actually, not just a few. Remember, the core personality is set before the ages of 6 or 7. So they want to get to that child before the core personality is set. If they can inflict extreme trauma on that child before the core personality is set then it will be easier for them to make them dissociate from reality in the future.
Moderator: Can you talk about the school system? Children are mind control now from a very young age.
Tew: I can´t answer that question. I don´t have a point of reference on that.
Questioner: Thank you so much, Bryan. This is the best thing that has happened to me since I found out.
Tew: Remember, it´s a fabricated and falsified stream of electromagnetic energy that they are using against you….. It contains a hidden carrier frequency. They can dial into your brain using a specific frequency. When you have a cell phone and you dial a number, the cell phone transmits that frequency to the nearest cell tower and that cell tower transmits that signal to the person´s cell phone. It´s similar to that. The stream of energy contains data, a hidden carrier frequency they can manipulate you with.
It´s all about two things; directed energy (electromagnetic energy) and nano-technology that adheres to the neuro transmitters cells in your brain. That´s how they manipulate your mind. It´s not just visual and verbal, it´s also auditive. Just like the IRS audits you. They can audit the mind with this technology.
This is not a beam. This is a continuous, never-ending stream of energy specifically tuned to your brainwave signature. So you could be standing in a room of 100 people. And only you have the right brainwave signature to absorb the energy of the carrier frequency signal. The others in the room don´t absorb that and they are unaware.
Questioner: Thank you because I saw your spirit change when the woman asked for solutions. And you got calmer.
Tew: One solution is called ¨clenching¨… It´s when you learn to read active memory. You maintain situational awareness of your surroundings and of your thoughts. You are paying attention to your thoughts. You realize then able to realize when these artificial impulse injections happen are injected into your subconscious. Because this happens at the subconscious level. For example, if you suddenly start burning with a white hot rage, over and over again. This technology is designed to target your short term memory (anything less than 30 seconds) while you are formulating your thoughts and preparing to act. Before you do act.. In order to pitch you into an action that they want you to do.
So you´ll be sitting in your living room and they´ll inject the idea of getting up and going to the bank. This would prove their technology is effective. But suppose you spontaneously decide to stop at the gas station first. They can´t handle this. So be spontaneous every chance you get. This disrupts their technology. If they can´t build single coherent patterns of thought, they can´t map your brain.
The most effective for me is ¨redirection.¨ This is establishing a working reference. Maybe something that makes you extremely happy. For me, it´s Jesus. They were trying to get me to think about this… and I redirected to that…. Jesus, Jesus, Jesus. I redirected away from the remote neural attack.
Often, they´ll try to push you down into an extremely drowsy state. They use theta waves (below 4 Hz) to do this…. They´ll slowly bring you down with theta waves. Then they´ll hit you with sudden drowsiness. Anything that lowers the person´s energy level, makes them more susceptible. They are pitching you into functional disorientation. That was a remote neural attack. They use extreme drowsiness to trick your brain into accepting their remote neural attack. They want you think about this, not that.
So the happy event is your working reference. Jesus, in my case. You just redirected away from the remote neural attack to your working reference.
Question: For those of us who are 100% isolated, set up with fake relationships, is there ever any hope of us having a normal relationship with someone that is not interfered with.
Tew: First, you need Jesus, find people who are also directed toward Jesus. As a first step, try to educate them…. Did you read this article about mind control or organized stalking. Then they reach the point when they accept it on their own.
Question: Maybe I stated it wrong. They won´t allow me to have friends. Is there a possibility that I will have a normal relationship, friendship that they will not interfere with?
Tew: Others will not understand Remote Neural Monitoring. Educate them first. Find people that share the same hobbies and likes that you have and you educate them. You don´t tell them you are a targeted individual.
Question: If we were constantly defeat the system by doing what you recommend, can we ever be untargeted?
Tew: My understanding is that this is a lifelong process. They are constantly trying to create trauma against you. This Hyper Game is a game that never ends. It goes on forever. In order to defeat this, you have to decide to never play the game in the first place. Second, you could place the hive mind team in a position where they can no longer play their position against them. In order to achieve some normalcy in your life, you have to find the things that make you really happy.
You might not realize it, but you are being targeted hundreds of times a day. Multi-tasking and spontaneity are really good at breaking patterns. Also, clenching, maintaining situational awareness. If you keep having the same thoughts over and over again, you have to be able read active memory and contrast your thoughts with the thoughts you had before you were targeted. The supercomputer is injecting the same things over and over again.
Question (Kim): Those things do help, I use them.
Question: You mentioned a couple times; focus on the things that make you happy. But since this is trauma-based, they replace our positive memories with negative memories. You have to make a conscious effort to find happy memories. It can be difficult to think of something positive. You have to make a conscious effort to remember these happy experiences. I know that people are attacked 100´s of times a day. We almost have to write down the positives so we can remember.
Tew: There is a difference between brainwashing and mind control. Brainwashing is the erasure of memory by amplifying and increasing of acetylcoline levels in your brain…. This causes people to forget things.. Mind control is controlling you memory and thought process. They are erasing specific memories and implanting others.
If they are trying to subdue your love for a spouse or your faith, brainwashing can be used.
One of the things they are doing at night is called sleep hypnosis. They are actually walking you back into your past and planting false memories. They will use trigger stimuli. They will engage you in conversations in religious topics while they are hitting you with electromagnetic energy. This is street theater to gauge whether the neuro programming is effective or not. You start to look for patterns. Then you multitask…. You put your earphones on. Or you begin to redirect.
The street theatre will also contain bits of topics they are using in the neuro-programming. When are people, armies, and animals most vulnerable. When you are sleeping. They have to constantly inject memories back in your subconscious.
Question: Do you know how hypnosis works?
Tew: Hypnosis is done by tying people to a stimuli.
Question: Is it possible to be targeted from birth?
Tew: Yes, people say they are dealing with tinnitus and fossing when they are children. If you can inflict trauma on young children, they are more likely to dissociate, it´s easier to create this multiple personality disorder. They can locate the alters. This is how they create the superspies. They can literally create Dr. Jekyll and Mr. Hide.
Moderator: One lady with a new baby felt that her baby was getting V2K transmissions to the brain.
Tew: Yes, a baby can´t communicate. At a young age, they inflict extreme trauma. They increase this until the child breaks, dissociates from reality. This targeting of children is called Monarch Programming. These are incredibly evil people who have a demonstrated a propensity to kill on command. Who have no conscience. Who can follow orders without the conscience getting in the way. They become desensitized. They can kill you and then have a cup of coffee. They are sociopaths who have been turned into psychopaths. These are doctors, professors, pretending to be the Church pastor, etc. Trauma based mind control requires Satanic Ritual Abuse, which is ritualistic torture. It is just long term brutal ritualistic torture.
You expose the child to this at a very young age. Then you can force them to dissociate more easily.
Moderator: I want to sincerely thank you. I think you helped a lot of people tonight.
Addendum To Interview: Tew’s Clarifying Email Communique to Dr. Eric Karlstrom
I listened to your interview on the Kev Baker Show regarding the 3.5 hour video I made with a woman named Renata. The audio is bad at times So I needed to clarify something.
Cars, vans, trucks, boats, planes ships, etc., are all used for the purposes of the Mobile Platforms and segments of entire urban populations can be targeted simultaneously with these Mobile Platforms but while those are the instruments and mechanisms they utilize, none of those things are the actual Mobile Platforms.
The Mobile Platform is a NEURO-CHIP in the body or gear (e.g: Clones) of the Hive Mind Team members. It is about the size of a grain of sand and is called the ‘Electronic Brain to Brain Interface’. They are not using screens, monitors, etc., as that is ‘old hat’ technology to them. They are using a Virtual Interface only they can physically see. Think of a highly sophisticated Virtual Reality headset which creates a virtual environment, but the Hive Mind Teams don’t need the headset.
They are using an eye gaze tracker instead of a mouse. They interface with the RNM Supercomputer (Brain to Computer Interface) to attack the victim when they wish to manually inject during each phase of EEG Heterodyning. The Clones’ thoughts are the active triggering sequence which the RNM System (Conscious Computer) responds to as it locks on to your emotional state.
They pull up multiple virtual screens at a time. For example, the first screen is the brain wave patterns of the mind control victim. The second parallel screen is the brain wave patterns of the Clone Member of the Hive Mind Teams. The third drop down screen is a mixture (EEG Heterodyning) of both the victims’ brain wave signature and that of the Clone Member, etc. Depending on their objectives additional screens can be opened and closed as needed but those screens are invisible to anyone who does not possess the Electronic Brain to Brain Interface (Neuro-Chip).
The Hive Mind Teams are not sitting in some laboratory or office somewhere. They are out in the field constantly attempting to interact with you at regular intervals, such as for the purposes of verification of their technology etc. They are sitting next to you on the plane; the new employee sitting near you at the office, the new pastor at the church, etc. THE Hive Mind Teams don’t have to be near or next to you to attack you, but these are some examples which may help you understand what they are doing and how they use the Mobile Platforms.
(Also) The moment you are selected as a test subject for Mind Control technologies all the available apartments, homes, offices, hotel rooms, etc., near and next to your residence are sublet and the Hive Mind Teams, Surveillance Teams, Organized Stalkers, etc., move in and training research and development begins. Placing a person inside a Psychotronic Concentration Camp is no small operation so a lot of people are involved. Sometimes the sheer magnitude of the operation can overwhelm new victims.
The Clone Members of each team clone their brainwave signatures to the victims’ brain wave signature and engage in remote neural manipulation at regular intervals. The RNM System does the rest.
The Hive Mind Teams can be easily manipulated using bait and switch tactics with your thoughts.
In other words, you learn to read active memory and correlate the patterns (e.g beautiful women, etc.) to whatever stimuli they are using against you and create a false pattern and then break it. I do this with them a lot and find it very satisfying. Worked well this weekend.
I keep telling them to use voluptuous beautiful red heads against me, but they never listen.
UNDER HEAVY ATTACK RIGHT NOW AS I TRY AND TYPE THIS EMAIL TO YOU. BODY TEMPERATURE AND HEART RATE INCREASING RAPIDLY.
I EXPECT POSSIBLE INTERFERENCE WITH THE TRANSMISSION OF THIS EMAIL AS HAPPENED MANY TIMES IN THE PAST.