Individual countermeasures
Individual countermeasures
As individual responsibility can be seriously externalized through manipulation, a formal ban of listed threats would be the best solution for the population, opponents and States. The victim believing that DEW / LRAD / V2K targeting is her internal voice (like the little one you may have in your head) is a real danger — maybe the one preventing further declarations about these weapons capacities.
Speaking of NeuroRights, I would like to specify the prefix "neuro-" has become a suitcase word. Meaning you may fall on "neurowar", "neuroprison" (see Cognify prison scandalous concept), "neurodefense" (as I did use several times) or even "neurospying" (or thoughts spying as described by Targeted Individuals). However, please note that the US HAVANA Act expressly mentions "neurological attacks".
If you can, modify sleep cycles to create inconsistencies in the targeting (possibly giving you time to breath).
Listen to music (aloud or not) to cover tinnitus symptoms (ringing ears) or electronic harassment to put you in a better mood.
Think about sound isolation for your main room, a sound isolation box, or use Faraday isolation (this do not let Infrared, Bluetooth, Radio, Wifi, GPS, 3G, 4G, 5G frequencies to pass through).
Limit the number of electronic devices around because they can be hacked to emit sounds (see C2K acronym definition).
Buy comfortable noise reducing speakers you can sleep with.
Strengthen your devices' cyber-security level.
As exposed in the following note, you may need to be aware of the content you host your phone if you are hacked, specifically for explicit content (nude, intimacy, etc.) for you and your relatives, meaning you should hide or suppress this content.
See more about the subject here. We can detect common patterns and element of language in the victims’ testimonies (from Havana Syndrome victims and self-called Targeted Individuals) — and other sources (...) — showing us that these actors do use :
Induced scenarios expressing a governmental attribution on entities from various countries all around the world (naming especially intelligence), like CIA, MOSSAD, etc).
Induced scenarios expressing an attribution put on mystical entities (whatever they could be, or a contact with deceased relatives, aliens or psychics, like God, evil, dead grand-parents, etc).
Induced scenarios expressing an attribution put on real (or not) parastate organisations (beliefs about a global organisation, whatever it is, manipulating the whole world or actively attempting to, like: illuminatis, world government, new world order, etc).
Induced scenarios expressing an attribution put on self-hallucinations, or typically the “you are crazy” sermon (like beliefs about schizotypical hallucinogenics voices or vagues voices in the distance — LRAD spatialisation — being aggressive, irritative, constantly or extremely vulgar, in a seemingly attempt of militarize schizophrenia).
Induced psychotic scenarios of attribution about neighbors or an ethnicity (attention please, by falling into these you are at risk at committing an induced murder).
Induced scenarios expressing an attribution put on “talking objects” (from Targeted Individuals testimonies: ventilators, air conditioning systems, refrigerators, etc. — or mostly all electronics systems that can emit sound).
Rational deductions about the last point : a DEW / LRAD sound superposition to a house electronic system ambiant noise (like a ventilator running) can be done from a near position or from a near pirated sound system — indeed to make go crazy about "talking ventilation''
I discovered that sensible voice recognition AI applications do perfectly pick up the DEW / LRAD footprint and even words under the right conditions from the targeted side (poor, poor Siri). Moreover, this LRAD targeting fully explains TIs testimonies and rumors and rumors about "synthetic telepathy" (see OHCHR report).
Personalty calling it SAPT, the threat is making intensive efforts to stay hidden in the shadow of the grey-zone and use the “make believe” war doctrine for its own goals with DEW / LRAD — also pirating devices — to make the victim believe in one or several of the cognitive coverts listed above, which makes attribution complicated, so let’s explore the attribution without attribution concept.
The meta-attribution concept I personally developed is another way ensure a rational attribution without being hooked in one of the induced psychotic coverts used by SAPT. Explained simply, by collecting a maximum of rational elements about the aggressor the goal is to map the threat from its meta-data : it's like to beat around the bush with your opponent waiting for more and more elements of interests to ensure attribution. This exercise is exclusively logical and rational.
Example of meta-attribution for SAPT :
It is equipped with state-of-art military equipment or hacking technical, but ;
It does not respect any national or supra-national Law or Treaties, and ;
It attacks a wild range of personalities (government representatives, diplomats, see Havana Syndrome and Tis testimonies) ;
It does it internationally (see the Risk definition map).
The concept of reverse-spying is aimed at extracting informations from a DEW / LRAD aggressor, with that you can force the aggressor to speak to retrieve information through various means (like verbal agression, insults, making fun of him) — to force him to have excessives reactions (would him be a DEW / LRAD operator or hacker) in mere goal of retrieving high-value informations about SAPT :
Goals, motives, origin
Technics, equipment
Other victims
Funding
And from your aggressors (test him) :
Retrieve information about his level of education / culture ;
Fluent languages frequently used (which brings valuable attribution information) ;
Ethnicity ;
Sex ;
Age.
More generally :
Collect proofs (video, acoustical or electromagnetic signature), and ;
Systematically cross-reference what the attackers say to reveal the elements of interests, and ;
Practice this aggressive attrition on your aggressor like a martial art (like Kapuera).
Important note about neurodefense and NeuroRights
I define neurodefense as all the tactics and strategy used individually or collectively to ensure a respect of NeuroRights (recall from the definition section).
So, it must be acknowledged that psychological and cognitive spaces are definitely personal, intimate, private and inviolable and that all dommageable consequences for an intruder violating this space — would they be about health, analysis or interpretation, financial, materials, legals or about safety — are definitely inadmissible and unforgivable.
Thus, all prosecution attempts coming from a deliberate use of defense mechanisms by the victim (as listed inside this section) aiming at luring or make the intruders flee away from this personal and inviolable space are definitely unjustifiable and inadmissible.
About the illusion of craziness or need of rationality
See the Risk definition section to help yourself have a rational approach , you can also use voice recognition systems to capture the V2K / LRAD footprint.
About rationalization
One important point I discovered when cross my experience with the hardest Targeted Individuals testimonies is that one of this harassment consequences is to tend to view as the reality a matrix, here you can see why it is false. This is the consequence of hard harassment and possible neuroprogrammatic schemes.
So please, instead of chasing "bugs" or "cognitive bugs" or "cognitive bias" inside a "matrix" like visible in some TIs testimonies, view the whole thing as a Canva with a fucker trying to scribble on it. Passing from a hideous boxed reality view to art makes it utterly easier to undergo.
Neurodefense
Use “psychocyberdefense” (as defined by IARPA), a way to undermine your aggressors directly on the psychological field, like if you are permanently spied on, put "nyan cat" aloud on your speakers or using a pre-recorded loop with narrow affirmatives sentences (like "Yes, indeed !" ; "Unbelievable !", "I don't think so", "Maybe" etc. — to prevent DEW / LRAD / C2K targeting continuation).
If your C2K / DEW / LRAD targeting contain several voices, ask these fuckers to speak all at once, you will then be able to evaluate the number of aggressors you really have.
Speak aloud and share to be heard by another person (neighbors, family, passers, internautes) and use critical keywords to break down SAPT human, technical and financial and targeting resources between the all the hearing people.
About alleged biosecurity risks (ot neurocybersecurity or cybernetic risks)
You can see the definition of this risk here. In Targeted Individual testimonies, we often hear about “thoughts spying” and other kinds of “thought intrusions”. From my deductions and my own experience with that (being a victim of this), it may be issued from multispectral spying (infrared frequencies, live phone-data exploitation, live video observations, others) — or due to the long duration exposition to DEW / LRAD. The worst outcomes being emotional states reading and statistically deduction of thoughts (we now have AIs risks to be managed too).
To protect yourself from such abuses if you believe your personal expressions are spied on, the best is to use a Faraday isolation and to downgrade your phone use (speaking of spywares or possible Adint). Furthermore, to evade micro-expressions or so-called neurospying, the best is to use a reinforced hood or neck warmer with a stronger elastic to reduce the amplitude of movement of the jaw, the cheeks and the glottis (which diminish readability capacities).
Linguistic tracking
Create convincing acronyms, stories or expressions and wait and see how aggressors or other persons may reuse it further in time (both for rationalisation and threat mapping).
As you can read in Targeted Individual testimonies, you can (as I did) experience car stalking around your house or outside.
Interpellate people in the street by their physical attribute to break the bystander effect .
Use shaming ;
Record the scene ;
Share.
Note : I myself have been exposed to strange and gaz-lighting doubtful events, like in 2017 around 2 AM in Paris (look [Moto] in IPX) during the night or truly today the 4th October 2024 at 16h45 where I've heard a heavy motorcycle roaring sounds while saving this website. In both cases, these roaring sounds occurred during digital and personal content saving toward an offline HDD. The one in 2017 occurred during my iPhone save (IPX) — and today while saving my website, the one you are reading on. You can even see my struggle to open my Gmail account due to "silly bugs" in the Drive.
If you are a person suffering from Havana Syndrome or a Targeted Individual — and that you manage to spot the individual harassing you with a DEW / LRAD living nearby, it is then really hard to do not employ brute force if you have certainty about it.
If you come to kill the aggressor, please rapidly call the cops, leave the door open, lie down on the ground near the electronic equipment used to harass you with a paper stating clearly that you were the victim.
#Key:Havana