The intent of this chapter is to explore the various tactics, feints, and ruses employed by the operators of neuroweapons. These tactics often involve V2K which is delivered into the target's cranium. Every entry in this chapter describes an attempt at deception (aside from the educational resources).

Comments (58)

Thought Identification

There has been public research into using EEG caps to identify the brain's intentions seconds before those intentions are carried out. This delay window is being harnessed by remote neurofeedback networks to convince some targets that they are being "mind controlled", when in reality they are hearing their own intentions extracted and autoverbalized via synthetic telepathy, in real time.
The apparently precognizant nature of the dialog is designed to be alarming, and designed to convince targets that they have lost control of their own body, which is a falsehood.
I'm currently under the impression that preventing sleep deprivation plays a critical role in resisting these deceptions and similar suggestions, which can be combined with simpler pulses of electromagnetic energy to nerve bundles, causing precisely timed muscle contractions, in order to create a more complete illusion of control.

Aside from control claims made to the target, imagine an "access terminal" briefcase being placed in front of a VIP, where the operator/perpetrator is asking a target questions as the VIP watches, in the form of "perform x if y is true", where x is an action that has already been identified, and the query is short enough to fit within the ~2 second window between a thought/action being identified, and the thought/action being carried out.
Using this method, the perpetrators can juxtaposition an action as if it were communication or affirmation that any query of their choosing is true (or false).

For example, a target's thought is identified as the intention of scratching their nose, and before the action is carried out by one of their arms, the phrase "scratch your nose if you kick puppies" is said so the VIP onlooker can hear (the target is not even privy to the query), and then to their astonishment they see the target scratch their nose. The VIP now thinks that clearly the target is a puppy kicker.

Phosphenes

Phosphenes, which are usually small and fleeting points, spots, and bars of colorless or colored light (which in the scope of this subreddit, are being caused by electromagnetic stimulation), are being utilized against targets, for purposes of deception.

Some targets are told that the visual phenomenon, such as strobing in their peripheral vision (from magnetophosphenes evoked with rapid pulses of electromagnetic energy), is proof that they are in a "virtual world", because why else would you be seeing a 15-30Hz strobing effect, like old CRTs? I believe this has caused some individuals to behave as if they will simply "respawn" in their "virtual world" if they are harmed, because they mistakenly accepted a truth claim that was only backed with phosphene visual effects.

Convincing targets that they are in "The Matrix" could be a common vector, if the outcome often results in character assassination or death. Just because your senses are being deceived with directed energy bioeffects in reality, does not make anything virtual. The technology operators will attempt to trigger dissociation, or a detachment from reality.

Misdirection Tactics

Given the perpetrator/operator/program/AI ability to generate auditory illusions with a full 3D field of sound (needing to only electromagnetically stimulate your left/right cochlea, while utilizing head-related transfer functions), this capability is being harnessed to misdirect targets toward dead ends, innocents, or convenient firefights, or away from tactically sensitive positions.

The following DSP effects are intended to deceive a target into mistakenly believing that what they're hearing is being generated from a known, familiar, or accepted source:
- Direction of "down the hall" for "overheard partner remark".
- Direction of "down the hall" for "coworker remarks".
- Direction of "supervisor's office" for "termination remarks".
- Direction of "over the horizon" for "revolutionary crowd".
- Direction of "over the horizon" for "emitter source".
- Direction of "over the horizon" for "metaphysical beings".
- Direction of "below/above/wall" for "obsessed neighbor".
- Direction of "below" for "demons from hell".
- Direction of "below" for "disgruntled office tenant".
- Direction of "above" for "angels and deities".
- Direction of "above" for "aliens and spacecraft".
- Direction of "above" for "airplanes and drones".
- Direction of "over the shoulder" for "gang stalking".
- Direction of "over the shoulder" for "grocery shopper".
- Direction of "back to front pan" for "passing drivers".
- Direction of "left or right side pan" for "salty pedestrian".
- Direction of "through the wall" for "annoying noise".
- Direction of "through the wall" for "death threats".
- Direction of "behind" for "rustle of leaves".
- Direction of "behind" for "round being chambered".

All of the above example "source" suffix terms can be interchanged, as the perpetrators can generate any sound from any direction, while recognizing some combinations are never supposed to be used because they would reveal the deception.

Keep in mind that the intensity can be reduced to make the "source" sound farther away or attenuated. This is merely an algorithmic reduction in electromagnetic energy output aimed at the cochlea, and can make deceptive sounds more believable, as if they were coming from an enclosed space like a car, or a distant hilltop, or an adjoining room.

"The Chosen One"

In the context of synthetic telepathy deception tactics, the perpetrators/operators will attempt to convince a target that they are special or unique, by claiming attributes about a target are highly desirable to their operation because any number of falsified reasons. The attributes most often claimed to be unique or special are ones that are uncommon in the general population, to make the claims more believable.

Narcissistic targets are the most susceptible to this tactic, especially those with profound levels of narcissism, who are all too eager to agree with the perpetrators/operators claims of a target's very special social standing.

For example, the following could be common deception vectors:
- Strategy game players sought for "military tacticians".
- Business managers sought for "important negotiations".
- Crypto enthusiasts being sought for "intelligence services".
- Religious followers for "heavenly calling or celestial duty".
- Spiritual or new-age folks for "psychics or telekinetics".
- Metaphysical believers for "sainthood or deification".
- Paranormal researchers for "offworld ambassador link".
- Military veterans sought for "deniable covert operations".
- Government representatives for a "secret grand council".

Then with the above "covert role" being bestowed upon a target via synthetic telepathy (there's never any visual validation, beyond phosphenes, because endless reasons/excuses/threats), a target begins to burn-their-candle-at-both-ends by expending mental effort towards fabricated scenarios that have been fully automated, and their efforts are merely generating waste heat in a datacenter running the program. This tactic is also used to keep targets awake for extended periods, which makes them further susceptible to other deceptions and memory problems.

False Dichotomies

Also known as a false choice, or false dilemma.
In the context of synthetic telepathy psychological warfare, an often used tactic is to present two choices to a target, with a time allotment, and the insistence that a far worse outcome will happen if no choice is made.
Despite these claims, targets must strive to resist and accept that the answer to these false choices and high-pressure tactics is often "why not both?" or "neither". The long term goal should be to fully dismiss and ignore the query completely, but that takes time to master, and choosing your own third and fourth options, or the above responses of both/neither is an adequate mental workaround in the short term.

See also:
Straw man
Loaded question
Reduction fallacy
You're either with us, or against us

False Stops

In the context of synthetic telepathy deception tactics, the perpetrators/operators will often claim that they are ceasing the harassment/monitoring, over and over again.

This is an attempt to elevate a target's emotional state, due to thinking their torment has come to an end, when in reality the harassment will continue the next day, hour, or minute. This tactic emphasizes the need for targets to reject even the positive claims being made, as accepting them allows the perpetrators to cut down a target's emotional state at any time by retracting the positive claim, which can induce emotional instability, or otherwise lead to the perception of an unstable emotional state.

Another related tactic is to announce something similar to "wrap it up, we're done here", while continuing to remotely monitor, to observe how the target behaves while believing they're no longer being watched.

Feigned Influence

A foundational deception that enables others, like juxtaposition, and an attempt to frighten or convince an onlooker or VIP that the technology operators posses behavior and movement "control" capabilities.
Remote/wireless brain-reading feeds may be purported as "pusher" style forceful suggestions, when what's really happening is passive monitoring. They are putting the cart before the horse, creating the illusion of a target "taking commands", when really the brain-reading capability is granting a operators/automation a seemingly "pre-cognizant" ~2-3 second window, where they know what a target is about to do, a moment before they do it. This "thought identification" time window is mentioned in public BCI research available in the Wikipedia "brain-reading" article, where this has been achieved with an EEG cap connected to a computer. The "identified thoughts" can then be mislabeled or mischaracterized as "commands", when they are read-only data. Anyone unfamiliar with the lag time window granted by brain-reading would perceive a mislabeled feed as a person being controlled.

While it's plausible that V2K could be used for suggestion purposes, that still does not equal control, unless the target is completely unaware or otherwise highly suggestible.

See also:
Feigned Internal Monologue
Remote Brain-Reading Capability
Juxtaposition Capability

Feigned Ignorance

Everyone wants to feel needed.
So much so that they could talk themselves into exhaustion, while believing that they're helping. There are operators/AI/programs that prey on this desire, by asking endless questions, by feigning ignorance about every topic under the sun, and then expecting the target to provide the answer.

  • They may be masked as curious offworlders, during a crucial "first contact" scenario (unforgiveable to avid Star Trek fans).
  • They may pretend to be a family member, friend, romantic interest, or celebrity who has just now been targeted, and needs a crash course in survival from a fellow target. Rejecting the ruse? The operators/programs will insist the deception is real, and that they will surely die without your help.
  • They could sound ike a neighbor or someone in proximity, who doesn't understand that what they're hearing is not real, with the intention of drawing in a target, who would then sound like they're helping a hallucination.

As sick and deranged as this tactic is -- using folks' kindness and willingness to help, as a weapon against them -- the reality is likely to be that all of their answers are routed into /dev/null, the digital equivalent of a paper shredder. The effort to generate the questions rest on markov chain generator code, which consumes small amounts of electricity and generates waste heat, in the balance.

Remember that silence is a calorie-free activity. Targets don't owe a second of their time to their tormentors, and never need to participate in any high pressure scenarios. Fucking them off with a "Google it" is also a reasonable option, including when they say they don't have internet access. Neuroscience technology operators with third world problems? SysOps pls.

See also:
Input Starvation

Imitation Games

Similar to the way that WW2 spies were captured, while their channels of communication stayed in-place, as if nothing happened, neuroweapons grant a kind of technology enabled identity theft.
Using an AI/program, others may hear/observe wholly or partially fabricated dialog that they would likely believe to be genuine and coming from a target, who is being surveilled or within proximity.

Markov chain generators are utilized for this purpose, which use a dictionary of chained words, generated from a target's previous dialog. Then these chains are used to identify opportunities to fabricate add-on words and phrases. This allows the operators to misconstrue an innocent/genuine sentence as a repellent one, by tacking on additional words -- like a weaponized version of adding "in bed" to the end of fortune cookie fortunes.
Note that this is not verbalized or even thought by the target -- only an observer will hear or read the grafted-on words, unaware that there has been any tampering. This technique can make anyone sound like human garbage.

For some examples:
- When a target is denying something; that they have never done _, the AI/program will add on "...except _". For example:
Target: "I don't have anything to be ashamed of"
AI/program adds: "...except horse porn".

  • When making lists. For example:
    Target: "I'm grilling some hot dogs and burgers"
    AI/program adds: "and road kill".

  • When questioning the operators' motives:
    Target: "Why would you do this to people?"
    AI/program adds: "...that are guilty of genocide?"

Expanding on the "Target 'Aura' Capability" topic, V2K could be used on people within proximity to a target, especially when there is no visual validation possible. The directional V2K they hear could be so repellent that no one will even ask the target, "did I just hear you say __??".

For example:
seated in a cubicle, bathroom stalls/showers, Jail cells/vents, COVID face masks, hotel rooms, apartments, echos down halls, open windows, etc.

See also:
https://www.resemble.ai/
Word Replacement & Sentence Clipping Capability
Surveillance MITM Capability
Target "Aura" Capability
Directional V2K Capability

Concern Trolling

Religious folks that are nuttier than squirrel shit adore this activity. Using their fantastical framework of original sin, or their dualist concept of unsaved souls, or other batshit religious cult fuckery like in LDS and Scientology's "Fair Game" style policies, they feel justified in their harassment of both lifelong and recently separated non-believers, ex-members, and political targets.
This saccharine venom and mock worry and panic is used to attempt to saddle their targets with law enforcement intervention. While they may just be useful idiots that likely aren't involved with the energy weapon abuses, they will drum up a target's molehill missteps from harassment, until they are magnified into a towering mountain of a crisis. They will feign imminent victim-hood while you are being abused as a target. They will manufacture a cacophony of worry in their echo chambers of confirmation bias. They will create metaphorical tornadoes, from the gale forces of air sucked through their teeth, while praying for the sirens that follow.
Familiarize yourself with "red flag" laws, extreme risk protection orders, and 5150-style involuntary psychiatric intervention, as these are their desired end result.

Systemic Gaslighting

You'll hear it from the willfully ignorant, because they ain't never heard of that before.
You'll hear it from the professional shills, because they have a vested interest in denying the truth.
You'll hear it from the government establishment, because they've been parroting the same answers and talking points for so long, that they've started to believe their own bullshit rhetoric.
You'll hear it from psychiatrists who look at you like a nail, because they're a hammer that doesn't understand technology or electromagnetic engineering.
You'll hear that you're just crazy.
That energy weapon abuse is purely a delusion.
In the same way that evolution proponents are just crazy to young earth creationist simpletons.
In the same way that Galileo was a crazy heretic for correctly stating that the Earth isn't at the very center of the solar system.
In the same way that pathological narcissists use psychological projection as a toxic coping mechanism: they're not crazy, you are.

You'll encounter these infants in adult suits everywhere you go, and they will attempt to blame the victim of their failed hypothesis of a worldview. Often the best response to these types is to savagely mock them for their backwards opinions, by comparing their opinions to other laughably-wrong-in-hindsight opinions throughout history:

Inquisitors: "Everyone we claim is a witch, is always a witch, because we never make mistakes. We then torture them and burn them at the stake. Do you really think there's any other explanation for bad weather?"
Psychiatrists: "Everyone we claim is schizophrenic, is always schizophrenic, because energy weapons are purely a delusion. We then commit malpractice with forced antipsychotic medication, and wait for them to kill themselves. Do you really think there's any other explanation besides hallucinations?"

See also:
Compare & Contrast

On Believing Kindness

Over synthetic telepathy or V2K, a common tactic is to weave together "white lies" or rather, deceptions masked as kindness. This can be far more effective than threats, because the lies are things that the target wants to hear, or wants to be true.
Targets must learn to reject both the good and the bad things they hear; the kind claims must be lumped into the same boat of rejection as the threats and abuse. Believing even the positive/good/kind claims arms the perpetrators/operators with the ability to pull away the kindness whenever they wish, giving them the means to make a target depressed on queue. This can cause a negative emotional state during crucial spans of time, leading to squandered interviews, meetings, conversations, dates, etc. By not believing what is heard, you deny the perps/operators the ability to pull the rug out from under you, any time they wish.

For example:
- Romantic interests
- Career opportunities
- Money & financial support
- Incarceration release
- Media coverage
- V2K stopping
- Power & fame
- Awards

Shit Totalitarians Say

  • They'll act like clergy nagging you with "an eye for an eye makes the whole world blind", when their true motivation is an aristocratic, "that's only okay when we do it".
  • They'll say "we don't take no for an answer", and then act like you're a psychopath for threatening to cut their dick off, just like any other rapist has coming.
  • They "wouldn't say that", while doing just that.
  • They'll say "well that's your choice" after backing you into an impossible situation.
  • They cannot be mistaken, and instead of even considering that they could be wrong, they deflect and ask if you could be.
  • They'll act like victims when you turn the tables and mirror their abuse back at them.
  • They'll say "be that as it may" as they destroy your life, after ignoring exonerating evidence.
  • They'll say "I've never heard of that before", as if that's proof that you are indeed insane.
  • They'll say "is that a threat?" if you point out their behavior has historically led to violent civil uprisings.
  • They'll say "what's V2K?" while assuming that you must be hallucinating, and delusional.
  • They'll say "you need Jesus", and then, "you need medication" if they are rejected.

An AI of Many Masks

It's difficult for many targets to accept that what they're hearing via V2K or synthetic telepathy is likely to be an automaton, program, or artificial intelligence, that is able to utilize an astonishing number of voice packs or synthesized voices. Like the Hexadecimal character in the 3D animated ReBoot TV series, who instantly changes her facial expression/mask when passing her hand in front of her face, the AI/program heard by some targets can instantly context switch to a new identity with matching voice applied to its dialog. This is intended to draw in targets so they chatter away and waste huge spans of time. The mask/voice can be friends, family, heads of state, coworkers, celebrities, holy figures (prophets, deities), extra terrestrials, men in black, authors, porn stars, neighbors, people you just met or spoke to or emailed, cthulhu, the recently deceased, house pets, demons, angels, IT (Pennywise), telepathic wizards, our new robot overlords, the ghost of xmas past, romantic interests, CEOs, ents, etc.

Designed to purport itself as any identity that a target will believe to be true... anyone or anything that will capture a target's attention, to wick away mental effort, to burn calories, to induce exhaustion. Tell the AI your dreams, and it will weave a tapestry of lies around them, pulling you along on its tapestry coat tails until you are totally divorced from reality, preferring instead to listen to a grand illusion, made just for you (song background).

See also:
https://www.resemble.ai/
Impersonate Upon Mention
V2K Chatbot Capability
Synthetic Telepathy Capability
Imitation Games
Input Starvation

The Long Distance Game

Many tactics revolve around keeping targets physically separated from other folks, so the impersonation tactics can be successful, instead of the ruse collapsing if targets were to meet each other in-person, outside of communication channels that can be tampered with. Some folks try to claim that "bubbling" someone into a walled garden of activity is a delusion, and as a network/systems engineer, I can say with authority that those folks are technologically illiterate. Those folks are divorced from the reality of malicious network attacks. They are foolishly saying the equivalent of "pay no attention to the man behind the curtain" or even the more grossly out of touch version, "there is no curtain". These Luddites are telling targets and society to "pay no attention to the man in the middle", when such things are demonstrated every year at DEFCON, a network security convention. This horrifying disconnect between military and technology capabilities, and the psychiatric establishment, cannot continue.

For example:
- Outside the internet, if a target can be isolated with neuroweapons with V2K or synthetic telepathy capabilities, they can be led to believe they are hearing and talking to folks, in their cranium, so there's no need to contact them via other communications channels.
- By using a Stringray-like device or malware on either party's device, SMS/text messages can be intercepted and then either deleted or tampered with, to meddle with individuals' perceptions of each other.
- There's nothing stopping a bad actor from cloning a social media website's functionality and redirecting a target's traffic to the fake version. They could even selectively choose which posts and comments are shared on the true website, and which posts and comments from the true website are allowed into the target's walled garden version. The content could be altered in both directions.
- Given the impersonation capabilities via V2K and synthetic telepathy, those same voice packs could also be used to make phone calls and radio transmissions.

Countermeasures for these technology middlemen:
- When possible, meet with folks in-person, when that's not possible, use heavily encrypted channels such as VPNs, Tor, PGP/GPG email, and Pidgin IM client with the OTR plugin. See PRISM-Break.org.
- Create printouts of paper packets, instead of linking to online resources, which could be tampered with in-transit or via malware.
- When available, use web content validation plugins/add-ons for your browser, which could compare a page's hash value with a P2P swarm, a blockchain, or a Tor hidden service, to provide tamper evidence, so you know what what you're viewing is identical to what everyone else sees.

See also:
https://www.resemble.ai/
Imitation Games
Cloned Authentication Fobs
Technostalking Capability
Man In The Middle (Network Attack)

Mock Executions & Suicides

Another tactic perpetrated via V2K and synthetic telepathy is that the operators/programs will manufacture what sounds like folks being murdered or committing suicide, both remotely and within proximity. Targets may hear what sounds like an apartment neighbor shooting themself, in an attempt to goad the target into calling 911 to report the incident, then when LEOs arrive, nothing is wrong, and the target is then assumed to be hallucinating.
Targets may also hear the alternate version where a bad actor claims to have loved ones at gunpoint, and will then make demands of the target. This is intended to coerce the target into taking orders (that only they can hear, making law enforcement intervention impossible or self defeating), or to get the target to call those loved ones in a panic, when nothing is actually happening, giving them the impression that the target is suffering from delusions from hallucinated voices, and may even be a danger to them, due to the "imagined" violent scenario.

See also:
Directional V2K Capability
Synthetic Telepathy Capability
Auditory Illusion Capability

On Neverending Torment Claims

"This is never going to stop", they will claim.
The perpetrators/operators will attempt to make you believe (via V2K), through spans of uninterrupted harassment/abuse, that they will only stop upon the event of your death, as their chosen target. They may even claim to have done permanent damage to your brain/ears/organs, and that they HAVE stopped already, and that what you're now experiencing is coming from your own body:
- "Latent schizophrenia" while continuing to hit you with auditory illusions.
- "Tinnitus" while still generating intense noise.
- "Organ damage" while still targeting a specific organ or nerve bundle with spikes of pain.

Always remember that these ruses are an attempt to crush your morale, and make you consider a lifetime of these afflictions, when the reality of energy weapons is that they can be switched OFF just as quickly as they were switched ON. Do not give them the deniability they want, with suicide.

Feigned Traditional Surveillance

While this is very difficult to accept for most targets, they are more likely being surveilled by energy weapon platforms from great distances, and not by bugs, cameras, devices, or personal electronics. Part of the reason that this is difficult to accept, is that the operators will vehemently pretend that they are watching targets with video cameras, audio bugs, and compromised devices, as a misdirection tactic.
If the target can be goaded into searching for listening devices, or paying for bug sweeps, they will inevitably come up empty handed, making them appear paranoid or delusional. Time and money may also be wasted on device replacements, thought to be bugged, or otherwise no longer secure.
It took me months to realize and accept that brain-reading technology was being used to recover my typed, read, and "thought" words, sentences, and characters. Even as an IT professional, there was a period of time where I thought my smartphone and laptop had been hacked and keylogged, or that Van Eck phreaking was being used.

Something to keep in mind, is that brain-reading surveillance is not admissible in courts of law, nor do thought-crimes exist, yet. So while the operators will feign that you're going to get in trouble, by using (non-existent) surveillance footage or recordings, it is always a bluff. In order for EEG data or other brain-reading evidence to be accepted, the operators would have to reveal their method of collection, and they are NOT going to do that. The operators need the deniability to remain intact, otherwise their ability to cause the perception of mental illness would be undermined.

See also:
Securing Your Accounts
Remote Brain-Reading Capability

Feigned Sexual Deviance

Outrageous "Big Lie" sexual slander may be commonly perpetrated against some targets, as a means of justifying their cruel and unusual treatment. Protesting the repeated lies is like saying "I'm not a witch" to an inquisitor from the 1600s. They say, "We are never mistaken" as they fill your boots with molten lead, "so why don't you just admit you're a witch?".
Energy weapon operators, drunk with power, or blinded by surveillance feed tampering, will say via V2K, "We are never mistaken", as they zap you in the genitals, "So why don't you just admit that you fuck horses/kids/corpses/fags/realdolls/ur mum?". They'll pick one and run with it.
They don't give a shit that's it's not true.
They will repeat it so often to the target, or make it sound like folks in proximity are saying it, that the target may prompt or confront folks about it, who would then wonder, "why is that person hallucinating about x", or, "why do they have a guilty conscience about x?"...

Most folks don't seem to care if it's true or not, as long as the slander suits them.
Targets purported like THAT surely deserve to be tortured, they tell themselves...

As a target, remind yourself that merely repeating something does not make it true.
Not even when many people repeat it many times (we call that religion).
That's not science, that's a sick cult of folks that don't care about reality.

See also:
Crotch "Buzzing" Capability
Electromagnetic Assault Capability
Word Replacement & Sentence Clipping Capability
Surveillance MITM Capability

Feigned Broadcast Tampering

Purported to be a "special" or "magic" device like a radio or television or tablet, targets may hear what sounds like audio "coming out of the device", that's seemingly talking directly to them as an individual. While malware could accomplish this, or even a bug connected to a speaker, these both involve unneeded risk and cost, when the same capability can be delivered without hardware tampering and without software exploits.
Not only can directional V2K be used to impersonate neighbors, shoppers, and coworkers, it can be used to "impersonate" a device, by using a DSP filter so the audio/voice channel sounds like the device's speaker, and using stereo head-related transfer functions, so that the target perceives the source of the audio/voice as coming from the device's location, relative to the target's head telemetry.
This ruse works just as well on house pets, so don't pull a Jerry by purchasing first class airfare for you and your cat (because it told you to loosen up like on Season 4 Episode 4 of Rick & Morty).

See also:
Auditory Illusion Capability
Directional V2K Capability
An AI of Many Masks

Feigned Internal Monologue

As the author, this tactic was still attempted on me, even though is was preverse to use on me, as someone without a verbal internal monologue, probably due to mild autism (I think in spatial concepts and pictures and audio samples, and one of my parents has asperger's). This is basically a feedback loop of brain-reading aimed back at the same target via V2K (sort of a closed circuit synthetic telepathy), where the V2K is purported to be their "thoughts".
Then once an observer believes they're witnessing an "internal monologue surveillance feed", other completely fabricated "thoughts" can be added, which the observer will also believe to be genuine, coming from the target's brain, when they did not.

For example:
- While writing, a V2K voice will word vomit out words that a target is considering for a sentence, which may be an attempt to feign influence on what's being written. This is done with the ~2-3second time window granted by brain-reading technology.
- When smelling something (or merely breathing in through the nose), a V2K voice will make up vile "what it smells like", in the hope that someone monitoring thinks that what the target and they are hearing, is coming from the target's brain.
- When silently reading text around the target's environment, a V2K voice will speak the text. Works on books, webpages, etc. Likely an automaton that is, again, attempting to convince others that the V2K is the target's internal monologue.

Gullible VIP folks may see/hear these V2K ruses as "proof" that it's a target's internal monologue, because they can match some of what they saw/heard to text/books/writing/webpages from a target's environment, and therefore they falsely conclude that EVERYTHING that they saw/heard was genuine.

See also:
Feigned Influence
Feigned Verbal Control
Juxtaposition Capability
Synthetic Telepathy Capability
Remote Brain-Reading Capability

Feigned Verbal Control

Presented to targets via synthetic telepathy with the intention of getting the target to believe they're controlling someone else's speech. Those that fall for the ruse expend fruitless mental effort, perhaps thinking that they have "mind powers" which would likely be perceived as magical thinking by a mental health professional. The target may be dropped into a scenario, where they are the subject of the conversation, and they hear their internal monologue or speech in someone else's voice, as if they are "speaking through" that person, like a ghost speaking through a medium (also bullshit). The target may then spend minutes or hours advocating for themselves or others, "as someone else".

What's really happening is a feedback loop, where the target's own internal/external speech is recovered into text words, has a voice pack applied, and the V2K ruse loops back into their own cranium.

Another example that I hope I'm wrong about, and sorry for the gender binary example: if the operators were ugly enough to consistently apply a voice pack or synthesized voice of the opposite gender to a target's recovered "thoughts", and then loop back their own "thoughts", could those targeted be led to believe that they are transsexual? Could they convince otherwise cishet male targets that their "inner self" is a female, and vice versa?

One line block diagram: Feedback loop:
[Target]-->[Brain-Read/Speech]-->[Voice pack]-->[V2K]-->[Target]

See also:
https://www.resemble.ai/
Feigned Body Control
Feigned Internal Monologue
Remote Brain-Reading Capability
Synthetic Telepathy Capability
/r/OpenV2K

Feigned Body Control

While acknowledging that the perpetrators/operators of neuroweapons may actually posses this capability, as a fellow moderator of /r/psychotronics, Phillip Douglas Walker aka /u/ActivistEthos, said that he was body controlled and forced to delete his own work from the internet -- this topic covers the feinted version, intended to goad targets into believing that they are "in the driver's seat" of someone else's body, or that their own body is being controlled.

Similar to aiming pinballs at Rudy on the "Funhouse" pinball cabinet to get an "Ow!", targets can be led to believe that their imagined/actual limb movements (recovered with wireless/remote brain-reading) are being carried out by someone else's limbs, as the target will hear V2K feedback that will be variations of: "Ouch!", "Why did I do that??", "falling over noises", etc.
While it's highly amusing imagining that you're getting someone to talk to their hand like Mr.Hat, ultimately nothing is happening except flushing time and calories down the toilet on an elaborate ruse.

Another tactic that could be described a feigned body control, is achieved by using the 2 second time window from remote brain-reading, where a thought has been identified but not carried out yet. Then by using that 2 second window to say something to the target via V2K, such as "move your right arm", the target can be led to believe they are being body controlled like a living marionette. No actual control is happening, it's a deceptive timing trick that can be very convincing to a newcomer.

See also:
Bioeffect Capabilities
Remote Brain-Reading Capability
V2K Chatbot Capability

Feigned Call Forwarding

Because synthetic telepathy is the hands-free, electronics-free, device-free equivalent of a phone call, targets can be led to believe that their calls are being forwarded into their cranium. While it's possible to do this, as the technology/infrastructure building blocks all really do exist, it is not actually done because it would undermine the current deniability that allows the operators to pass targets off as merely hallucinating.
This ruse is an attempt to condition targets into applying their phone etiquette to their internal monologue or cranium, and to convince the target that they "need to" respond professionally and politely because the "forwarded calls" are "real" and therefore carry the weight and consequences of a call placed to a wireless handset or smartphone or land line. They do not. These fabricated "calls" can be ignored and fucked off just like any other crank caller, with no repercussions.

See also:
An AI of Many Masks
Synthetic Telepathy Capability
Stand Your Ground

Impersonate Upon Mention

One of the "AI of Many Masks" favorite passtimes is to instantly "become" any name or identity mentioned by a target. The clever code base will respond (via V2K) to a target's internal/external dialog with first person pronouns like "I" or "me" to purport itself as the very individual just named by the target. This gives the impression of being "linked" or having a verbal/audio "mind meld" with anyone that comes to mind during or after a real world conversation.
If a target casually mentions that Kim Kardashian is the sexiest woman on the planet, they may find themself "linked" with "Kim" after the AI slaps on a voice pack that sounds like her.
If a target is ripping on Microsoft, about patch Tuesday hotfixes making their favorite video game crash, they may get a V2K "forwarded call" from a saddened "Satya" saying that he's happy for the target, and is going to let them finish, but that Windows is the best OS of all time.

See also:
Imitation Games
An AI of Many Masks
Synthetic Telepathy Capability
Feigned Call Forwarding
https://www.resemble.ai/

Feigned Arousal

This topic is less for targets, and more for surveillance personnel, observers, and VIPs who review feed data for brain-reading subjects. This ruse is often used on targets as they watch television programming and commercials: their sex organs are "zapped", buzzed, or otherwise artificially stimulated with electromagnetic energy, when wildly inappropriate or abhorrent-in-context subject matter is displayed on screen:
- Horses, sheep, and misc barnyard animals.
- Diaper commercials, or featuring children.
- The gender opposite of their preference.
- Folks being shot, stabbed, or murdered.
- Folks faceplanting or breaking bones.
- Folks speaking within proximity (or via V2K).
- Air raid, red alert klaxons, police sirens, etc.

Using this method, anyone targeted can be made to appear aroused, by subjects that they truly have zero interest in. It may also be possible to influence dreamscapes with suggestions, combined with juxtapositioned "zaps", to claim a target's "subconscious desires".

See also:
Juxtaposition Capability
Feigned Sexual Deviance
Event ID Trigger Capability
Crotch "Buzzing" Capability
Bioeffect Capabilities

Misconstruals