Understanding the memory attacks (blocking your real memories & injecting false memories & motivational impulses) are key because if you do not recognize modification of your ‘active memory’ the system will cause you to briefly lose time perception which may be enough procedural [functional] disorientation to influence you to respond to an injected impulse or memory attack.

It is possible for the RNM system to influence you to speak unwillingly or, at the very worst, without you knowing it. For example, if you are susceptible to the systems influences you may not realize that it is frequently or constantly influencing you to make minor choices. These motivational impulses can also be used to influence you in a manner that will give you the desire to speak, and I emphasize desire because you need to understand that these impulses will only make you feel the urge [at higher levels set by the attackers] or basic motivation [at baseline levels] to perform the tasks it is influencing you to do

Now in combination with this motivation to speak the system uses past memory references to direct you ­ for example, your personal memory of turning to speak to your wife & the associated impulse ­& when you react to this influence the system will block your working memory while streaming the desired output which will result in you making one or more statements under the system’s control They will test this on you frequently with ‘word substitution’ and if you can learn to control this in thought then you can control it while speaking but you must learn to read active memory

If you cannot recognize modification of your active memory then after the forced speech attack it is possible that you will have no recollection of making the statement As you learn to defeat the predictive capabilities of the system by reading active memory (testing and validating your own thoughts) you will see their attempts to restrict your ‘reference choices’ will become increasingly evident and you will begin to perceive what I will describe as ‘functional duality’ [it might also be described as focal duality] within your working memory.

The perps system’s prediction error rate will dramatically increase & its attempts to predict your thoughts or intentions will become humorous if not simply annoying Seeing the relationship between your own previous memory references and the systems output [which can be a specific memory or emotion previously captured by the RNM System and now replayed perpetually in your mind] is critical to understanding how to control & ultimately defeat ‘thought­ triggered’ attacks in addition to preventing the attackers from deceiving & manipulating you

You should be able to redirect the system during ‘Formulation’ (collecting data by reading your mind) or prevent ‘Predictive Integration’ (interpretation of data from injected thoughts & impulses) altogether, but when you learn to stop integration, realize that the system will be waiting for completion & will ‘probe’ you for a response. It will begin to ‘inject’ again if you attempt to ignore it If successful , you will notice they will also abuse you in every way possible to convince you that they’re in control when you will be able to see clearly that they are nothing more than idiots who need to spend more time studying the systems they are abusing people with If the system’s suggestions are not acceptable to you [and they won’t be if you’re consistently blocking and/or redirecting it] then this will result in you making a continuous effort to counter the imposition of thoughts and impulses while contrasting you’re ‘working state’ to maintain active focus

Although by cooperating & allowing the system to interpret & define your daily activity you may find that the suggestions become more tolerable as the system is designed to mimic your normal cognitive behavior, I would recommend not allowing this as you will tend to more readily accept the system’s influence, and the purpose of the system influencing you in this manner is to give the attackers the ability to restrict you at will & to allow them to deceive or manipulate you subconsciously You can only counter these restrictions if you are able to contrast the system’s influence from your own willful activity. Everyone who is hearing “V2K” is being monitored in this manner & being influenced in this way as well.

The phrases you are hearing should be related to information captured during the ‘silent monitoring period’ & will eventually be used as the foundation for your endless verbal harassment What they do is a game of deception & manipulation, nothing more. Do not accept anything they say as truth & do not acknowledge anything the system interrogates you about as truth. The system will take random bits of anything it captures through your senses & fabricate stories which they will use to harass & interrogate you with no intention other than to distract & torture you into submission [to the system’s influence]

Source:  https://www.youtube.com/watch?v=tiiX-t0S2aU&t=254s

Bitchute: https://www.bitchut,e.com/channel/YBM3rvf5ydDM/

Gab: https://gab.com/hopegirl

Telegram: https://t.me/Hopegirl587

EMF Protection Products: www.ftwproject.com

QEG Clean Energy Academy: www.cleanenergyacademy.com

Forbidden Tech Book: www.forbiddentech.website