Exposing the Hidden Reality of NHI Technology and Its Weaponization

Introduction and Initial Purpose

This technology was originally introduced into my life for covert surveillance as part of a National Resources-aided narcotics investigation initiated by the Lackawanna County District Attorney’s Office’s Drug Task Force. The operation was based on erroneous intelligence provided by a criminal informant in the summer of 2020, which falsely portrayed me as an out-of-state drug trafficker. This unfounded intel, which was not vetted at all, led to the commencement of a CIA-aided investigation despite my being a native resident with no criminal or arrest history. I couldn’t be more of an innocent victim who was never an intended candidate for targeting.

For two years, they covertly observed me from within my own mind, but with no charges to bring against me, the operation shifted dramatically in May 2022. At that point, the technology’s two-way communication capabilities were weaponized to initiate a CIA-sponsored, 24/7 psychological torture operation (PSYOP) with the explicit goal of coercing me into a drug and alcohol rehabilitation center. Their intention was clear: to conduct an extraction procedure for the technology within the controlled confines of a rehab facility.

They ended up canceling the extraction procedure and comenced the full time targeting I am still suffering through today.  They got me to reenter rehab a second time when I discovered I’ve been trying to report and publicly denouncing the domestic division of the CIA for 2 years without knowing it but they again cancelled the extraction for continued abuse.  The CIA’s activities in Lackawanna County in PA need to be investigated.  Someone needs to rescue me.

For over two years, I tried to report what I initially claimed was DARPA-level surveillance technology, only to be forced into the harrowing realization of a much larger conspiracy. I am now committed to exposing the truth: It is Non-Human Intelligence (NHI) Brain-2-Brain-Computer-Interface (B2BCI) Remote Neural Monitoring (RNM) psychotronic surveillance technology, weaponized and deployed nationwide for covert thought monitoring in joint investigations.

Stubborn Forced Acceptance of Reality

The rational mind instinctively rejects the existence of this technology. Like most, I initially attributed the occasional voices I heard to external surveillance bugs, strategically placed in my environment and being used two-way to sporadically transmit shift changes as an offensive tactic to instill paranoia.

For a long time, I dismissed the possibility of anything more advanced. However, prolonged exposure gradually forced me to confront the unsettling truth. What began as brief, sporadic communications escalated into a relentless, unyielding presence. Initially, I believed I was experiencing one-way V2K “Voice of God” transmissions. I thought that while I could hear them, they could not hear my thoughts, leading to interactions that were purely vocal on my part.

Over time, the undeniable reality emerged: my thoughts were being monitored and broadcasted. The communication cannot be mistaken as internal or imagined. It is delivered directly to the auditory cortex—clear, external voices, not thoughts.

Initially Autonomous

I have experienced only one out-of-body experience (OBE) in my life, and it was directly tied to this technology’s initial entry. While lying on a cot, preparing to nap, my vision suddenly shifted. For a brief moment, I perceived from its perspective—floating down the length of my machine shop, entering my room, and seamlessly merging with my mind.

At the time, I dismissed the experience as a random instance of astral projection, assuming I had briefly left and returned to my body. There was no sense of malice or threat. The encounter felt unique yet unremarkable, and I would have forgotten about it entirely had I not later been exposed to the reality of the situation.

In hindsight, it is evident this event was unintentional on their part. Their standard procedure relies on targets being asleep during this process, ensuring the event remains undetected.

Advancement of Technology

This technology is an undetectable, microchip-less, non-invasive brain-to-brain-computer-interface (B2BCI) system operating extra-dimensionally. The B2BCI relies on a mind-link to a receiver for neural data conversion and transmission. It is equipped for covert remote neural monitoring (RNM) surveillance, enabling the simultaneous broadcast of neural data from its host to both stationary and mobile destinations.

Its psychotronic capabilities allow for two-way communication directly with the host’s consciousness, creating a collective mind where participants can observe and contribute in real time from anywhere in the physical world. This instantaneous communication is facilitated by a quantum entanglement connection, characterized by a non-local correlation. This interaction is impervious to physical distance, shielding, or interference, functioning without a detectable medium.

Additionally, the technology possesses offensive capabilities, enabling direct manipulation of the autonomic nervous system to inflict physical and psychological effects.

Indefinite Covert RNM Surveillance

Even after the exceedingly rare unintended out-of-body experience (OBE) during the technology’s initialization, I struggled to accept the reality of my situation. For two years, I was subjected to covert remote neural monitoring (RNM) without experiencing a single moment of paranoia or suspicion of being intensely observed, either mentally or physically. I had heard sporadic shift changes of cops clearly watching surveillance and knew of the operation for a bit but it didn’t feel extreme or as encompassing as it is.

The nature of this technology makes it virtually impossible for anyone—even those predisposed to paranoia or vigilant for signs of compromise—to detect or expose its presence. For 99% of covert neural monitoring targets, the total compromise of their mind remains entirely undetected. This technology is being used with impunity to observe and monitor individuals far more frequently than anyone would care to imagine.

Ease of Concealment

The secrecy of this technology is effortlessly maintained through its reliance on standard, off-the-shelf surveillance equipment on the receiving end. Aside from the undetectable B2BCI receiver, nothing about the system appears unusual or suspicious—even to those directly involved. Neural data is transmitted using modern protocols, seamlessly integrating with regular off the shelf audio and video surveillance electronics, with thoughts broadcasted as virtually indistinguishable from voice.

The only potential giveaway lies in the surveillance video feed’s point of view, which is from your own first-person perspective. However, the rational mind would never leap to the conclusion that this could possibly be a live feed from someone’s actual eyes unless explicitly informed. Human nature resists accepting the reality of NHI technology; even when presented with the truth, it is perceived as an immutable impossibility. As a result, the advanced origins of this technology remain effectively concealed, known only to those with strict need-to-know access.

Collective Potential vs. Human Misuse

This technology holds the extraordinary potential to create a collective mind—a shared network where the knowledge, wisdom, and insights of participants could unite to benefit humanity. Empowering the user with collective guidance, solving complex problems, and fostering unprecedented collaboration.

However, this promise of progress has been twisted by human nature into a weapon of profound cruelty. Instead of enlightenment, the collective is used as a mechanism of destruction, wielding psychological abuse as its primary tool. Gaslighting, humiliation, intimidation, relentless criticism, and degradation replace what should be constructive interaction. The system has been transformed into a conglomerate of hate, deployed with the deliberate goal of dismantling the psyche of its targets with overt intentions of driving them to suicide.

Aside from the targeting operations being used nationwide for the TI program it is a for certain reality that this technology is also being used for sleeper cell conditioning, Manchurian candidates, political influence, and intellectual property theft.

Until its misuse is exposed, halted, and galatically banned, this system represents not a humanity postitive beacon of hope but a cautionary tale of humanity’s destructive nature.

Tactics of the Collective

In the early phases of my targeting, the collective orchestrated highly coordinated operations involving their entire task force. These efforts were designed to inflict severe psychological damage, with the shared hatred among participants feeding off itself to amplify their cruelty. At its peak, I could discern as many as seven or more individuals participating simultaneously, their overlapping voices revealing the chaos of their interactions. I refered to these encounters as “Confrence Calls From Hell.” The unrestrained nature of these early operations led to mistakes, including moments when individuals exposed themselves. For instance, hearing: “Somebody call Chris,” inadvertently identifying phone call participation and revealing the lead detective in charge.

As the operation progressed, their tactics became more calculated and controlled. After the first couple of months, the number of active participants in the collective was reduced and access to outsiders or passersby was restricted to minimize human error. What remains is a streamlined, core two-person crew, dedicated to ensuring the operation’s continuity with unremitting, machine-like operations.

This core crew operates tirelessly, maintaining the collective’s presence around the clock. Additional operators join quite frequently, blending seamlessly into the ongoing abuse, adding layers of unaldultarated malice to the relentless psychological depatterning. This ensures the psychological torment remains unbroken, a constant and oppressive presence designed to erode the target’s psyche without reprieve.

Neural Data Conversion

The technology seamlessly coalesces neural data from the visual cortex (sight), auditory cortex (hearing), and inferior frontal cortex (inner monologue/thoughts) into a unified digital data stream. Using standard modern protocols, this data stream is broadcasted to completely off-the-shelf surveillance equipment.

This broadcasting of consciousness streams directly to a main operations base, where operators observe the target’s perspective on standard audio/video monitors. Confirmations from the operators themselves highlight the level of detail captured, such as remarks like:
“What’s that a bad connection?”
“No, he’s just blinking.”

The input sound level remains consistently stable—quiet yet unmistakably clear—avoiding overt obtrusion. On rare occasions, the level has been lowered to the point of inaudibility as an offensive tactic. Luckily, it has never been amplified to weaponized levels due to the limitations of the mind and not the technology it’s self.

Broadcasting Your Consciousness

The unified data stream is also broadcasted remotely to mobile operators equipped with headsets or potentially non-mind-linked BCI devices, enabling them to contribute during in-person operations or multitask on the fly. This was confirmed during in-person terror campaigns where I simultaneously heard the operators’ voices both audibly—from the woods outside my house—and through the B2BCI connection.

The broadcast combines thoughts and hearing into a single channel, making your thoughts indistinguishable from your voice. Operators literally hear your thoughts out loud as if they were spoken externally, with no distinction made by them to suggest otherwise. This creates a concise and seamless broadcast. However, non-linked operators occasionally struggle to interpret incomplete, layered, or fragmented thoughts. They frequently rely on the mind-link to clarify or repeat transmissions, evidenced by remarks such as:
“Jason, what did he say?”

Incoming Communication

Incoming communication is strictly audio-based, originating from external audio pickups. No mind-to-mind transmissions are ever received. These audio pickups sometimes capture environmental sounds, confirming the presence and actions of mobile operators during real-world operations, with their voices and environmental noises transmitted through the B2BCI.

During the initial in-person terror campaign, the operators’ tactics were particularly brutal. They weaponized emotional and psychological pressure, even using my dogs against me in their harassment. On one occasion, while I was away from home, the operators fired a gun off outside the residence, to terrorize my pack. This act was so overt that it prompted a neighbor to report the gunfire to the authorities, leading to a response from the state troopers who verified the incident.

B2BCI Mind-link

The B2BCI establishes a one-way connection between your mind and another human mind, designated as the receiver, who operates behind a secure firewall to prevent any neural data leakage. This mind-link serves as a hub, essential for converting and broadcasting the Remote Neural Monitoring (RNM) signal to standard surveillance equipment.

The connection to your mind is extraordinarily thorough, allowing the receiver to complete fragmented or abandoned thoughts as if they were their own. This capability has been verified by complaints from newly linked receivers who express frustration over the relentless, uninterrupted stream of incoming thoughts, noting that there is no “off switch” or reprieve from the connection.

While the receiver cannot access your memories or past directly, operators can strategically steer conversations and interactions to uncover desired information. Their access is limited to your present consciousness, meaning only what you are actively thinking can be observed. However, there is no way to conceal or suppress your thoughts once they surface—even fleeting or incomplete ideas can be detected and analyzed instantly.

Deception is virtually impossible unless you are pathologically deceptive; if you lie or withhold information, the system’s accuracy ensures that they immediately recognize the falsehood, knowing precisely what you know.

Nervous System Manipulations

While I have never experienced direct thought manipulation, the technology’s communication often provokes with deliberate tactics, and its capability to manipulate the nervous system is undeniable. I have endured two primary forms of attacks:

Inhuman Anxiety

The most frequent attack involves an inhuman level of anxiety, far surpassing anything biologically possible. This forced, overwhelming fear response incapacitates completely, leaving the mind unable to focus on anything except despair and thoughts of suicide as the only perceived escape. The physical symptoms are relentless—profuse sweating, uncontrollable heartbeat, and the compulsion to pace in a desperate attempt for relief.

No conventional anxiety management techniques, such as breathing exercises or meditation, offer even the slightest reprieve. These episodes are barely survivable, often lasting for hours, dictated solely by their will.

One particularly cruel use of this attack involved a timed assault occurring daily from 11:00 AM to 2:00 PM. These relentless, scheduled episodes forced me to quit my job, as enduring them became impossible. While the attacks stopped after I quit, it was clear the intent was to destroy my stability. Although often senseless, some attacks came with demands, which I would begrudgingly comply with to make them stop.

Tetanus-like Muscle Lock Attacks

The second form of attack mimics tetanus-like symptoms, ranging from mild to severe.

Mild cases involve symptoms such as lockjaw, speech impairment, and muscle cramping.
Severe cases cause my body to contort and lock into painful, unnatural positions, leaving me stuck in pretzel-like postures that make it difficult to breathe. These episodes can last for hours, sometimes an entire day, leaving me to suffer immobilized. They are often inflicted with no demands, purely for the operators’ sadistic enjoyment.
These attacks have been inflicted more than a dozen times and are the reason I have sought hospitalization repeatedly, desperate for relief.

"Kill Event" Manipulation

One terrifying event demonstrated their capability for total nervous system override. In what I can only describe as a “kill event”, my ability to breathe was suspended as a show of force. I heard the phrase: “Open your mouth and embrace death.”

The experience was uniquely horrifying yet felt disturbingly natural. It wasn’t like being strangled or suffocated; it felt as though I had never possessed the ability to breathe in the first place. The command to breathe wasn’t missing—I knew I had to—but there was nothing to execute the action. It felt like drowning without water, a long, panicked moment of terror before I suddenly regained the ability to breathe.

These manipulations highlight the disturbing extent to which this technology can wreck havoc on the autonomic nervous system for torment, intimidation, and sheer sadism.